Skip to content

Latest commit

 

History

History
192 lines (132 loc) · 9.52 KB

conference.rst

File metadata and controls

192 lines (132 loc) · 9.52 KB

Conference

Who should attend Security Onion Conference?

If you use Security Onion, then you should definitely make plans to attend Security Onion Conference! Even if you don't use Security Onion, most talks provide value beyond just Security Onion itself. So if you're generally interested in things like intrusion detection, network security monitoring, enterprise security monitoring, log management, hunting, and blue teaming, then you should consider attending Security Onion Conference!

Social Media

The Twitter hashtag is #socAugusta:

Security Onion Conference 2020

Security Onion Conference 2020 is currently scheduled for October 16, 2020.

Security Onion Conference 2019

Pictures

Security Onion Conference 2019 Video Playlist

Augmenting the Onion: Facilitating Enhanced Detection and Response with Open Source Tools by Wes Lambert

Creativity, Intelligence, and Security Analyst Thinking Modes by Chris Sanders and Stef Rand

Constructing Your Playbook within Security Onion by Josh Brower

Building a Detection Lab with SecurityOnion by Wylie Bayes

Finding traffic anomalies using SSL certificates by Bryant Treacle

Peeling Back the Layers: Using Security Onion to See Adversary Activity through All Phases of the Kill Chain by Benjamin Klimkowski and Sean Eyre

State of the Onion by Doug Burks

Security Onion Conference 2018

Pictures

Security Onion Conference 2018 Video Playlist

Security Onion Conference 2018

Save Time with Modern Filtering Techniques by Mark Jeanmougin

Blue, Red, Purple, White: Which team are you on? By Don Murdoch

Welcome to Georgia Cyber Center by Todd Gay

Pcaps Ahoy! by Brad Duncan

Integrating Osquery into Security Onion by Josh Brower

Getting the Most out of Freq and Domain_Stats by Mark Baggett

Introduction to Data Analysis by David Bianco

State of the Onion by Doug Burks and Mike Reeves

Security Onion Conference 2017

Pictures

Security Onion Conference 2017 Video Playlist

Matt Domko - Arming Small Security Programs: Network Baseline Generation and Alerts with Bropy

Don Murdoch - Building your Sec Ops Use Case

Joel Esler - Snort: History and Vision

Rob Gresham - Orchestrating into SO-OODA

Chris Sanders - Pivoting Effectively to Catch More Bad Guys

Doug Burks - State of the Onion

Security Onion Conference 2016

Pictures

Security Onion Conference 2016 Video Playlist

Security Onion Conference 2016

Eric Conrad - C2 Phone Home: Leveraging Security Onion to Identify C&C Channels
Robert M. Lee - ICS/SCADA Network Security Monitoring in Difficult Scenarios
Josh Brower - Uncovering Persistence With Autoruns & Security Onion
Chris Sanders - The Investigation Labyrinth
Martin Holste - ELSA 2.0
Chris McCubbin - Practical Cyborgism: Machine Learning for Bro Logs
Brad Duncan - My Use of Security Onion as a researcher
Nathan Crews and Tanner Payne - Simplifying Home Security with CHIVE
Doug Burks - State of the Onion

Security Onion Conference 2015

Todd Heberlein - Looking Back Over a Quarter Century of Network Monitoring
Martin Holste - Security Event Data in the OODA Loop Model
Chris Sistrunk - Industrially Hardened Security Onion Sensor
Josh Brower - Using Sysmon to Enrich Security Onion's Host-Level Capabilities

Security Onion Conference 2014

Richard Bejtlich - Keynote Speech
Dustin Webber - Why I Built Snorby and the Future of Security Interfaces
Paul Halliday - SQUERT – An Open Source Web Interface for NSM Data
Martin Holste - ELSA
Mike Reeves - Scaling Security Onion to the Enterprise
Josh Brower - The Security Onion Cloud Client
Chris Sanders and Jason Smith - Using Flow Data Effectively
Ben Knowles - Learn Analysis and Forensics for Free** with Security Onion
Tim Krabec - Custodiet MSSP Framework
Scott Runnels - Contributing to Security Onion
Doug Burks - State of the Onion, Q&A, Closing Remarks