SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts by using status filter below or Click Here.
Over the past few years, ransomware has become one of the defining cyber threats for organizations of all sizes. Organizations have changed their response processes, insurance policies, and staffing requirements based on this pervasive threat. Ransomware operators have made it clear that no industry or organization is safe, as they look to exploit any weakness in Internet-facing devices and services to get in and wreak havoc.
Join SEC670 course author Jonathan Reiter and SANS Principal Instructor Jorge Orchilles as they give a sneak peek at the latest SANS Red Team Ops course – Windows Tool Development. This is an advanced, 600-level course for the experienced Red Teamers. As Red Teaming evolves, you will realize that custom windows tool development is a requirement. Your generic and default payloads from most offensive tools will (and should) be caught by your security controls. Red Teams must build custom code to evade defenses and gain the objectives.
The presentation draws attention to practical threat detection and incident response from dissecting advanced ICS adversary threat capabilities, tactics techniques and procedures. Dean will illustrate why the cyber weapons and the techniques may be more important than adversary attribution for tactical ICS incident response.
Join us for Cyber42 on the hot topic of ransomware. This version of the game represents how a fictional organization responds to a ransomware event against the organization. Responses to ransomware events require not only managing the event but also the expectations of key stakeholders and external parties.
New to the ICS/OT security area? Are you an IT Security Manager stepping over to take on responsibilities to secure critical infrastructure? Maybe you’re in an engineering role taking a more focused approach to cyber security and practical cyber defense. Or perhaps you have IT security knowledge and are looking to explore OT security.
This presentation will explore the differences between how digital forensics is used when applied towards a forensic science goal, or a forensic engineering goal, in incident response.
Join SANS Purple Team courses author and Senior Instructor, Erik Van Buggenhout, and SANS Purple Team Ambassador and Principal Instructor, Jorge Orchilles, as they walk you through the new, innovative, and interactive Purple Team Poster.
This webcast will provide a detailed overview of all the products and pricing offered to qualified state, provincial and local government organizations, in the US and Canada through the SANS / CIS partnership program. Join in to hear from the SANS product experts and get your questions answered about the training solutions offered through the program.
Can your NDR solution protect you from zero-day threats before you become the next headline? This discussion will explore the salient requirements for NDR and other approaches as critical cybersecurity technologies. Investments in NDR, SIEM, EDR, and perimeter prevention alone are not enough to stop modern-day cyber-attacks. These tools lack network context, a fundamental requirement for achieving cybersecurity. NDR bolsters every phase of a SOC's maturity and an organization's maturity model. That said, not all NDR is created equal. This discussion will expose the characteristics of Advanced NDR that are most important to your cybersecurity operations.
ในการบรรยายนี้ Nico Dekens จะแนะนำขั้นตอนการตรวจสอบข้อมูล online ที่บิดเบือน และเทคนิคการตรวจสอบและยืนยันข้อมูลใน OSINT (Open-Source Intelligence)
In this talk Nico Dekens will step through the prolific disinformation propagating online and develop techniques for validation & verification in the OSINT environment.
Join this SANS Cloud Security Solutions Summit as we explore various cloud security topics through invited speakers while showcasing today's current capabilities. Presentations will focus on technical case studies and thought leadership using specific examples relevant to helping companies improve the security of their cloud environment through automation.