-
Notifications
You must be signed in to change notification settings - Fork 521
Conference
Please note! This wiki is no longer maintained. Our documentation has moved to https://securityonion.net/docs/. Please update your bookmarks. You can find the latest version of this page at: https://securityonion.net/docs/Conference.
Users of Security Onion should definitely attend! In addition, most talks provide value beyond just Security Onion, so folks generally interested in intrusion detection, network security monitoring, enterprise security monitoring, log management, hunting, and blue teaming should consider Security Onion Conference as well.
The Twitter hashtag is #socAugusta:
https://twitter.com/search?q=socaugusta
Security Onion Conference 2019 is scheduled for Friday, October 4, 2019. Please make plans to attend!
Security Onion Conference 2018 Video Playlist
Save Time with Modern Filtering Techniques by Mark Jeanmougin
Blue, Red, Purple, White: Which team are you on? By Don Murdoch
Welcome to Georgia Cyber Center by Todd Gay
Integrating Osquery into Security Onion by Josh Brower
Getting the Most out of Freq and Domain_Stats by Mark Baggett
Introduction to Data Analysis by David Bianco
State of the Onion by Doug Burks and Mike Reeves
Security Onion Conference 2017 Video Playlist
Matt Domko - Arming Small Security Programs: Network Baseline Generation and Alerts with Bropy
Don Murdoch - Building your Sec Ops Use Case
Joel Esler - Snort: History and Vision
Rob Gresham - Orchestrating into SO-OODA
Chris Sanders - Pivoting Effectively to Catch More Bad Guys
Doug Burks - State of the Onion
Security Onion Conference 2016 Video Playlist
Eric Conrad - C2 Phone Home: Leveraging Security Onion to Identify C&C Channels
Slides - Video
Robert M. Lee - ICS/SCADA Network Security Monitoring in Difficult Scenarios
Video
Josh Brower - Uncovering Persistence With Autoruns & Security Onion
Slides - Video
Chris Sanders - The Investigation Labyrinth
Slides - Video
Martin Holste - ELSA 2.0
Slides - Video
Chris McCubbin - Practical Cyborgism: Machine Learning for Bro Logs
Video
Brad Duncan - My Use of Security Onion as a researcher
Video
Nathan Crews and Tanner Payne - Simplifying Home Security with CHIVE
Video
Doug Burks - State of the Onion
Video
Todd Heberlein - Looking Back Over a Quarter Century of Network Monitoring
http://www.toddheberlein.com/blog/2015/9/11/security-onion-conference-presentation
Seth Hall - Detect it Once
https://drive.google.com/file/d/0BzQ65xrcMwNEYU4yQnV0QmYzX2s/view?usp=sharing
Martin Holste - Security Event Data in the OODA Loop Model
https://prezi.com/qzar9ip-zlvt/security-event-data-in-the-ooda-loop-model/
Chris Sistrunk - Industrially Hardened Security Onion Sensor
http://www.slideshare.net/chrissistrunk/def-con-23-nsm-101-for-ics
Josh Brower - Using Sysmon to Enrich Security Onion's Host-Level Capabilities
http://defensivedepth.com/2015/09/11/socaugusta-deck-sysmon-security-onion-integration/
Chris Montgomery - Threat Intel Powered IDS
https://drive.google.com/file/d/0B4apMwOBMmVUOXE0c0dDdWc1U0k/view?usp=sharing
Richard Bejtlich - Keynote Speech
Dustin Webber - Why I Built Snorby and the Future of Security Interfaces
Paul Halliday - SQUERT – An Open Source Web Interface for NSM Data
Martin Holste - ELSA
Mike Reeves - Scaling Security Onion to the Enterprise
Josh Brower - The Security Onion Cloud Client
Chris Sanders and Jason Smith - Using Flow Data Effectively
Ben Knowles - Learn Analysis and Forensics for Free** with Security Onion
Tim Krabec - Custodiet MSSP Framework
Scott Runnels - Contributing to Security Onion
Doug Burks - State of the Onion, Q&A, Closing Remarks
- Introduction
- Use Cases
- Hardware Requirements
- Release Notes
- Download/Install
- Booting Issues
- After Installation
- UTC and Time Zones
- Services
- VirtualBox Walkthrough
- VMWare Walkthrough
- Videos
- Architecture
- Cheat Sheet
- Conference
- Elastic Stack
- Elastic Architecture
- Elasticsearch
- Logstash
- Kibana
- ElastAlert
- Curator
- FreqServer
- DomainStats
- Docker
- Redis
- Data Fields
- Beats
- Pre-Releases
- ELSA to Elastic
- Network Configuration
- Proxy Configuration
- Firewall/Hardening
- Email Configuration
- Integrating with other systems
- Changing IP Addresses
- NTP
- Managing Alerts
- Managing Rules
- Adding Local Rules
- Disabling Processes
- Filtering with BPF
- Adjusting PF_RING for traffic
- MySQL Tuning
- Adding a new disk
- High Performance Tuning
- Trimming PCAPs