SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts by using status filter below or Click Here.
With organizations and individuals increasingly moving to the cloud, the need for secure and agile deployment pipelines is more important than ever. This session explores how to achieve this goal by strategically placing security controls throughout the different phases of the DevOps process. Topics covered include the DevOps toolchain, security tools, and techniques for injecting security controls into automated pipelines.

This webcast will provide a detailed overview of all the products and pricing offered to accredited educational institutions, in the US and Canada through the SANS / REN-ISAC partnership program. Join in to hear from the SANS product experts and get your questions answered about the training solutions offered through the program.

Call for Presentations Now Open | Deadline: Monday, May 1Learn More and Submit Your Proposal“Can we use AI in our workplace?” — This question is being asked of every CISO and technical leader worldwide. The answers are not easy.

Functionality is mission-critical to all organizations. It is also the critical element to anyone seeking to do harm to that mission. For an organization and its partners to make use of functionality, it must be visible to both. Organizations face uncertainty, because with increasing visibility comes an increased attack surface, and therefore increased risk. Or does it? This webcast looks at the correlation between the two, and how we can use factors of each to impact the other. This research will attempt to define best practices as well as understanding how organizations understand the two issues to be linked, and how that may inform their response.

Managing security and digital operations has become far more challenging due to increasing threats and increasing infrastructure complexity. How can enterprises effectively manage security for their large and dynamic infrastructures? Despite a plethora of security products, most enterprises struggle to minimize breaches, control costs, and avoid analyst burnout.

OSINTという言葉をご存知でしょうか? OSINTとは「Open Source Intelligence」を略した用語で、主に情報セキュリティの世界で使われています。インターネットをはじめとする多くの情報源からデータを収集し、分析・精査・取捨選択を行い、特定の個人やシステム、組織などについての調査を行う手法です。

Do you know what OSINT is? OSINT is an abbreviation for "Open Source Intelligence" and is mainly used in the information security world.

In this Webinar, experts from Corelight’s Public Sector team will discuss how security teams can use network visibility to resolve trust issues in Zero Trust deployment and lay the groundwork for the future.

With the rapid development of large language models (LLM) and generative AI, the landscape of cybersecurity has experienced a paradigm shift. In this one-hour webcast, we will delve into the emerging information security risks and opportunities associated with LLM and cyber deception operations. As these technologies become increasingly sophisticated, it is imperative for organizations to stay informed about potential threats and best practices in order to maintain a strong security posture.

大規模言語モデル(LLM)と生成AIの急速な発展に伴い、サイバーセキュリティの世界はパラダイムシフトを経験しています。これらの技術がますます高度化する中、組織は強固なセキュリティ体制を維持するためには、潜在的な脅威とベストプラクティスについて常に情報を得ることが不可欠となります。

Cloud environments are attractive targets for hackers due to their complexity, which can make them difficult to defend. This presentation will cover three crucial details of cloud setup that can greatly impact your cloud's security posture. We'll kick off by exposing common vulnerabilities that hackers exploit to compromise cloud environments. Then, we'll dive into effective mitigation strategies in three areas and show you how to implement them in a practical and hands-on manner. Our insights on mitigations will apply to typical enterprise cloud setups.

In this session, learn from Armis Field CTO, Steve Gyurindak, how your organization can overcome data security hurdles without compromising critical infrastructure or existing security solutions.
