SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Unlock industry insights and hands-on learning with upcoming SANS webcasts and workshops. View archived webcasts by using status filter below or Click Here.
Open Source Intelligence plays a critical role in malware analysis, especially in understanding the broader context of the attack, enriching findings, and speeding up attribution. In this talks, we will cover many examples about useful information found in malware samples, how to access them and enrich them. I promise, no assembly!
Join SANS for a special webcast introducing and demonstrating the New SANS Skills Quest powered By NetWars. SANS experts will provide an overview of this new and improved set of online range challenges that organizations can use to support continuous knowledge and skill development.
In this presentation, James Tarala, Senior Faculty at the SANS Institute and Principal Consultant at Cyverity, will introduce an automated cybersecurity risk management model that integrates data analytics with existing security infrastructures.
This talk will cover various data sources and attacks on data, including data sources used for AI/ML processing. The focus will be on how to confront and mitigate these data attacks in ICS/OT environments.
As software and hardware supply chains grow more complex and globally interconnected, they have also become prime targets for attackers.
A strong mission and vision provide security teams with clarity, direction, and purpose-but too often, they are overlooked or overly complicated. The good news? You don't need weeks of brainstorming to create a powerful, actionable mission and vision for your security team. Whether leading a new security team or refining an existing strategy, this session will provide a practical, repeatable framework to define and implement your team's mission and vision in an hour or less.
Attendees of this talk will learn about what vectors are, how they work, and why they're the building block of all AI systems. Armed with this knowledge you'll be better able to better use AI systems, and call out vendor snake oil!
By now you have learned how to travel through time using Time Travel Debugging. TTD is such a powerful feature and you’ve only begun to scratch the surface of its use cases.
Security operations centers face relentless pressure to detect and respond to threats around the clock—often with limited staffing and growing alert fatigue. In this 30-minute webcast, SANS Certified Instructor Mark Jeanmougin will examine how Dropzone AI can integrate into existing security stacks, support analyst development, and help SOC teams stay focused on high-impact decisions.
Graphical interfaces are great for quick tasks, but real cloud power users know that mastery of command-line interfaces (CLIs) unlock unparalleled efficiency, automation, and precision.
During this presentation, we interview several defenders to learn what turned out to be just a distraction, or what tools turned out to be a game changer for operations once properly integrated.
Attackers are increasingly targeting critical infrastructure — including power grids, water systems, heavy manufacturing, and oil and gas — with a deep and sophisticated knowledge of ICS components, industrial protocols, and engineering processes. Employing advanced techniques like Living Off The Land (LOTL) strategies, they repurpose legitimate ICS software for malicious purposes. These tactics, when combined with ransomware and ICS-specific attacks, significantly escalate the risks to both human lives and essential infrastructure, especially in times of warfare.To counter these threats, ICS/OT environments need specialized technology solutions and highly trained ICS defenders. The ICS Active Cyber Defense model emphasizes “skilled human analysts capable of monitoring and responding to adversaries within the ICS/OT network.” Defending against LOTL and similar threats demands cybersecurity teams with a blend of specific expertise in control systems, IT security knowledge and a prioritization of safety.Is your ICS/OT cybersecurity program equipped with the appropriate technology and expertise? The ICS Summit Solutions Track 2025 will present cutting-edge solutions, live demonstrations, and strategies for tackling today’s ICS security challenges. Presentations and panels will align with industry frameworks, such as the SANS ICS Cybersecurity Critical Controls, demonstrating how expertly trained ICS defenders, armed with ICS-specific solutions, can safeguard the vital infrastructure we all depend on.