| |||||
| |||||
Search Irongeek.com: ![]() ![]()
Help Irongeek.com pay for bandwidth and research equipment: |
A security operation without flows is no security operation! Prove it? I'll try to. In this talk I'll go over the details on what flows are, why I claim they are so important, and the differences between flow solutions and faux-flow solutions. Best of all, I'll be detailing how you can spend less than 15 minutes to completely set up your own flow solution. I'll be spending significant time answering "and then what?" with real-world practical examples of things you can do with flow data as well as live examples from questions in the audience.
Jason Smith has a background in physics and has built everything from particle accelerators to explosive neutralizing robots used by the military. He has worked in multiple US Department of Defense SOCs and was the lead security monitoring architect for the Commonwealth of Kentucky. Jason co-wrote Applied Network Security Monitoring and maintains the open source project FlowBAT, a graphical flow data analysis tool. Jason works remotely from his home in Bowling Green, KY and has been with FireEye since late 2013.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast