Who should attend Security Onion Conference?
If you use Security Onion, then you should definitely make plans to attend Security Onion Conference! Even if you don't use Security Onion, most talks provide value beyond just Security Onion itself. So if you're generally interested in things like intrusion detection, network security monitoring, enterprise security monitoring, log management, hunting, and blue teaming, then you should consider attending Security Onion Conference!
The Twitter hashtag is #socAugusta:
Security Onion Conference 2020
Security Onion Conference 2020 is currently scheduled for October 16, 2020.
Security Onion Conference 2019
Pictures
Security Onion Conference 2019 Video
Playlist
Augmenting the Onion: Facilitating Enhanced Detection and Response with Open Source Tools by Wes Lambert
Creativity, Intelligence, and Security Analyst Thinking Modes by Chris Sanders and Stef Rand
Constructing Your Playbook within Security Onion by Josh Brower
Building a Detection Lab with SecurityOnion by Wylie Bayes
Finding traffic anomalies using SSL certificates by Bryant Treacle
Peeling Back the Layers: Using Security Onion to See Adversary Activity through All Phases of the Kill Chain by Benjamin Klimkowski and Sean Eyre
State of the Onion by Doug Burks
Security Onion Conference 2018
Pictures
Security Onion Conference 2018 Video
Playlist
Save Time with Modern Filtering Techniques by Mark
Jeanmougin
Blue, Red, Purple, White: Which team are you on? By Don
Murdoch
Welcome to Georgia Cyber Center by Todd
Gay
Pcaps Ahoy! by Brad
Duncan
Integrating Osquery into Security Onion by Josh
Brower
Getting the Most out of Freq and Domain_Stats by Mark
Baggett
Introduction to Data Analysis by David
Bianco
State of the Onion by Doug Burks and Mike
Reeves
Security Onion Conference 2017
Pictures
Security Onion Conference 2017 Video
Playlist
Matt Domko - Arming Small Security Programs: Network Baseline
Generation and Alerts with
Bropy
Don Murdoch - Building your Sec Ops Use
Case
Joel Esler - Snort: History and
Vision
Rob Gresham - Orchestrating into
SO-OODA
Chris Sanders - Pivoting Effectively to Catch More Bad
Guys
Doug Burks - State of the
Onion
Security Onion Conference 2016
Pictures
Security Onion Conference 2016 Video
Playlist
Eric Conrad - C2 Phone Home: Leveraging Security Onion to Identify C&C
Channels
Robert M. Lee - ICS/SCADA Network Security Monitoring in Difficult
Scenarios
Josh Brower - Uncovering Persistence With Autoruns & Security Onion
Chris Sanders - The Investigation Labyrinth
Chris McCubbin - Practical Cyborgism: Machine Learning for Bro Logs
Brad Duncan - My Use of Security Onion as a researcher
Nathan Crews and Tanner Payne - Simplifying Home Security with CHIVE
Doug Burks - State of the Onion
Security Onion Conference 2015
Todd Heberlein - Looking Back Over a Quarter Century of Network Monitoring
Seth Hall - Detect it Once
Martin Holste - Security Event Data in the OODA Loop Model
Chris Sistrunk - Industrially Hardened Security Onion Sensor
Josh Brower - Using Sysmon to Enrich Security Onion's Host-Level Capabilities
Chris Montgomery - Threat Intel Powered IDS
Security Onion Conference 2014
Richard Bejtlich - Keynote Speech
Dustin Webber - Why I Built Snorby and the Future of Security Interfaces
Paul Halliday - SQUERT – An Open Source Web Interface for NSM Data
Martin Holste - ELSA
Mike Reeves - Scaling Security Onion to the Enterprise
Josh Brower - The Security Onion Cloud Client
Chris Sanders and Jason Smith - Using Flow Data Effectively
Ben Knowles - Learn Analysis and Forensics for Free** with Security Onion
Tim Krabec - Custodiet MSSP Framework
Scott Runnels - Contributing to Security Onion
Doug Burks - State of the Onion, Q&A, Closing Remarks