Doug Burks edited this page Oct 22, 2018 · 94 revisions

Security Onion Conference

Who should attend Security Onion Conference?

Users of Security Onion should definitely attend! In addition, most talks provide value beyond just Security Onion, so folks generally interested in IDS, NSM, Log Management, Hunting, and Blue Teaming should consider Security Onion Conference as well.

Social Media

The Twitter hashtag is #socAugusta:

Security Onion Conference 2018


Security Onion Conference 2017


Security Onion Conference 2017 Video Playlist

Security Onion Conference 2017

Matt Domko - Arming Small Security Programs: Network Baseline Generation and Alerts with Bropy

Don Murdoch - Building your Sec Ops Use Case

Joel Esler - Snort: History and Vision

Rob Gresham - Orchestrating into SO-OODA

Chris Sanders - Pivoting Effectively to Catch More Bad Guys

Doug Burks - State of the Onion

Security Onion Conference 2016


Security Onion Conference 2016 Video Playlist

Security Onion Conference 2016

Eric Conrad - C2 Phone Home: Leveraging Security Onion to Identify C&C Channels
Slides - Video

Robert M. Lee - ICS/SCADA Network Security Monitoring in Difficult Scenarios

Josh Brower - Uncovering Persistence With Autoruns & Security Onion
Slides - Video

Chris Sanders - The Investigation Labyrinth
Slides - Video

Martin Holste - ELSA 2.0
Slides - Video

Chris McCubbin - Practical Cyborgism: Machine Learning for Bro Logs

Brad Duncan - My Use of Security Onion as a researcher

Nathan Crews and Tanner Payne - Simplifying Home Security with CHIVE

Doug Burks - State of the Onion

Security Onion Conference 2015

Todd Heberlein - Looking Back Over a Quarter Century of Network Monitoring

Seth Hall - Detect it Once

Martin Holste - Security Event Data in the OODA Loop Model

Chris Sistrunk - Industrially Hardened Security Onion Sensor

Josh Brower - Using Sysmon to Enrich Security Onion's Host-Level Capabilities

Chris Montgomery - Threat Intel Powered IDS

Security Onion Conference 2014

Richard Bejtlich - Keynote Speech
Dustin Webber - Why I Built Snorby and the Future of Security Interfaces
Paul Halliday - SQUERT – An Open Source Web Interface for NSM Data
Martin Holste - ELSA
Mike Reeves - Scaling Security Onion to the Enterprise
Josh Brower - The Security Onion Cloud Client
Chris Sanders and Jason Smith - Using Flow Data Effectively
Ben Knowles - Learn Analysis and Forensics for Free** with Security Onion
Tim Krabec - Custodiet MSSP Framework
Scott Runnels - Contributing to Security Onion
Doug Burks - State of the Onion, Q&A, Closing Remarks

Clone this wiki locally
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session.
Press h to open a hovercard with more details.