Conference

Doug Burks edited this page Sep 18, 2017 · 76 revisions
Clone this wiki locally

Security Onion Conference

Who should attend Security Onion Conference?

Users of Security Onion should definitely attend! In addition, most talks provide value beyond just Security Onion, so folks generally interested in IDS, NSM, Log Management, Hunting, and Blue Teaming should consider Security Onion Conference as well.

Social Media

The Twitter hashtag is #socAugusta:
https://twitter.com/search?q=socaugusta

Security Onion Conference 2018

Stay tuned for more information about Security Onion Conference 2018!

Security Onion Conference 2017

Pictures

Security Onion Conference 2017 Video Playlist

Security Onion Conference 2017

Matt Domko - Arming Small Security Programs: Network Baseline Generation and Alerts with Bropy

Don Murdoch - Building your Sec Ops Use Case

Joel Esler - Snort: History and Vision

Rob Gresham - Orchestrating into SO-OODA

Chris Sanders - Pivoting Effectively to Catch More Bad Guys

Doug Burks - State of the Onion

Security Onion Conference 2016

Pictures

Security Onion Conference 2016 Video Playlist

Security Onion Conference 2016

Eric Conrad - C2 Phone Home: Leveraging Security Onion to Identify C&C Channels
Slides - Video

Robert M. Lee - ICS/SCADA Network Security Monitoring in Difficult Scenarios
Video

Josh Brower - Uncovering Persistence With Autoruns & Security Onion
Slides - Video

Chris Sanders - The Investigation Labyrinth
Slides - Video

Martin Holste - ELSA 2.0
Slides - Video

Chris McCubbin - Practical Cyborgism: Machine Learning for Bro Logs
Video

Brad Duncan - My Use of Security Onion as a researcher
Video

Nathan Crews and Tanner Payne - Simplifying Home Security with CHIVE
Video

Doug Burks - State of the Onion
Video

Security Onion Conference 2015

Todd Heberlein - Looking Back Over a Quarter Century of Network Monitoring
http://www.toddheberlein.com/blog/2015/9/11/security-onion-conference-presentation

Seth Hall - Detect it Once
https://drive.google.com/file/d/0BzQ65xrcMwNEYU4yQnV0QmYzX2s/view?usp=sharing

Martin Holste - Security Event Data in the OODA Loop Model
https://prezi.com/qzar9ip-zlvt/security-event-data-in-the-ooda-loop-model/

Chris Sistrunk - Industrially Hardened Security Onion Sensor
http://www.slideshare.net/chrissistrunk/def-con-23-nsm-101-for-ics

Josh Brower - Using Sysmon to Enrich Security Onion's Host-Level Capabilities
http://defensivedepth.com/2015/09/11/socaugusta-deck-sysmon-security-onion-integration/

Chris Montgomery - Threat Intel Powered IDS
https://drive.google.com/file/d/0B4apMwOBMmVUOXE0c0dDdWc1U0k/view?usp=sharing

Security Onion Conference 2014

Richard Bejtlich - Keynote Speech
Dustin Webber - Why I Built Snorby and the Future of Security Interfaces
Paul Halliday - SQUERT – An Open Source Web Interface for NSM Data
Martin Holste - ELSA
Mike Reeves - Scaling Security Onion to the Enterprise
Josh Brower - The Security Onion Cloud Client
Chris Sanders and Jason Smith - Using Flow Data Effectively
Ben Knowles - Learn Analysis and Forensics for Free** with Security Onion
Tim Krabec - Custodiet MSSP Framework
Scott Runnels - Contributing to Security Onion
Doug Burks - State of the Onion, Q&A, Closing Remarks