Skip to content
Permalink
Branch: master
Find file Copy path
Find file Copy path
Fetching contributors…
Cannot retrieve contributors at this time
194 lines (135 sloc) 8.68 KB

Conference

Who should attend Security Onion Conference?

If you use Security Onion, then you should definitely make plans to attend Security Onion Conference! Even if you don't use Security Onion, most talks provide value beyond just Security Onion itself. So if you're generally interested in things like intrusion detection, network security monitoring, enterprise security monitoring, log management, hunting, and blue teaming, then you should consider attending Security Onion Conference!

Social Media

The Twitter hashtag is #socAugusta:

Security Onion Conference 2019

Security Onion Conference 2019 is scheduled for Friday, October 4, 2019 and registration is now open!

Speaker Lineup

Wes Lambert
Augmenting the Onion: Facilitating Enhanced Detection and Response with Open Source Tools
Chris Sanders and Stef Rand
Creativity, Intelligence, and Security Analyst Thinking Modes
Josh Brower
Constructing Your Playbook within Security Onion
Wylie Bayes
Building a Detection Lab with SecurityOnion
Bryant Treacle
Finding traffic anomalies using SSL certificates
Benjamin Klimkowski and Sean Eyre
Peeling Back the Layers: Using Security Onion to See Adversary Activity through All Phases of the Kill Chain
Doug Burks
State of the Onion

Security Onion Conference 2018

Pictures

Security Onion Conference 2018 Video Playlist

Security Onion Conference 2018

Save Time with Modern Filtering Techniques by Mark Jeanmougin

Blue, Red, Purple, White: Which team are you on? By Don Murdoch

Welcome to Georgia Cyber Center by Todd Gay

Pcaps Ahoy! by Brad Duncan

Integrating Osquery into Security Onion by Josh Brower

Getting the Most out of Freq and Domain_Stats by Mark Baggett

Introduction to Data Analysis by David Bianco

State of the Onion by Doug Burks and Mike Reeves

Security Onion Conference 2017

Pictures

Security Onion Conference 2017 Video Playlist

Matt Domko - Arming Small Security Programs: Network Baseline Generation and Alerts with Bropy

Don Murdoch - Building your Sec Ops Use Case

Joel Esler - Snort: History and Vision

Rob Gresham - Orchestrating into SO-OODA

Chris Sanders - Pivoting Effectively to Catch More Bad Guys

Doug Burks - State of the Onion

Security Onion Conference 2016

Pictures

Security Onion Conference 2016 Video Playlist

Security Onion Conference 2016

Eric Conrad - C2 Phone Home: Leveraging Security Onion to Identify C&C Channels
Robert M. Lee - ICS/SCADA Network Security Monitoring in Difficult Scenarios
Josh Brower - Uncovering Persistence With Autoruns & Security Onion
Chris Sanders - The Investigation Labyrinth
Martin Holste - ELSA 2.0
Chris McCubbin - Practical Cyborgism: Machine Learning for Bro Logs
Brad Duncan - My Use of Security Onion as a researcher
Nathan Crews and Tanner Payne - Simplifying Home Security with CHIVE
Doug Burks - State of the Onion

Security Onion Conference 2015

Todd Heberlein - Looking Back Over a Quarter Century of Network Monitoring
Martin Holste - Security Event Data in the OODA Loop Model
Chris Sistrunk - Industrially Hardened Security Onion Sensor
Josh Brower - Using Sysmon to Enrich Security Onion's Host-Level Capabilities

Security Onion Conference 2014

Richard Bejtlich - Keynote Speech
Dustin Webber - Why I Built Snorby and the Future of Security Interfaces
Paul Halliday - SQUERT – An Open Source Web Interface for NSM Data
Martin Holste - ELSA
Mike Reeves - Scaling Security Onion to the Enterprise
Josh Brower - The Security Onion Cloud Client
Chris Sanders and Jason Smith - Using Flow Data Effectively
Ben Knowles - Learn Analysis and Forensics for Free** with Security Onion
Tim Krabec - Custodiet MSSP Framework
Scott Runnels - Contributing to Security Onion
Doug Burks - State of the Onion, Q&A, Closing Remarks
You can’t perform that action at this time.