SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts by using status filter below or Click Here.
This free virtual event brings together cybersecurity professionals, utility operators, government stakeholders, and industry experts to explore the unique challenges and emerging threats facing the energy and water sectors.
This talk explores the growing threat of illicit crypto mining within enterprise networks.
Did you know that much of your OT security risk comes from indirect effects to networks and operations?
Join SANS Senior Instructor Dave Shackleford for an inside look at Seemplicity, a vendor-agnostic remediation orchestration platform designed to unify vulnerability management across code, cloud, and infrastructure.
The updated SEC599: Defeating Advanced Adversaries – Purple Team Tactics & Kill Chain Defenses builds on the course’s strong foundation, while incorporating cutting-edge updates that reflect today’s adversaries, tools, and enterprise environments.
This webcast aims to provide insights into survey results, including the tools, techniques, and strategies needed to secure multicloud environments effectively—offering valuable guidance for organizations navigating the complexities of cloud security at scale.
Prepare for the Next Era of Cloud Security.
This talk is the AI talk you won’t hear anywhere else. Instead of hearing about all the greatness that AI brings, I will be talking about the side of AI you don’t know about.
Discover how to install and run attacker tools to hunt vulnerabilities in your environment before the pentesters (or attackers!) do.
Today’s cyber threats move fast—and the only way to stay ahead is to think like an attacker. A reactive approach is no longer enough. Organizations need to adopt a proactive, offensive security posture to uncover vulnerabilities before adversaries do.
What are the critical skills that extremely successful infosec professionals need, and how can we develop these? Obviously, technology matters, but it's not just about technology.
As cyber threats become increasingly advanced and persistent, traditional perimeter-based defenses are no longer sufficient to protect critical infrastructure.