<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2180921&amp;fmt=gif">

Intrusion Analysis and Threat Hunting with Open Source Tools @ FloCon 2022

In its early years, FloCon was an academic conference focused exclusively on network flow data but it has evolved into an annual event with a more broad focus “applying any and all collected data to defend enterprise networks.” 

All the events give the attendees the opportunity to try different technologies, to use many tools and to learn from the experts in network security. This year, we will share our practical experiences that we hope will help attendees gain the skills to improve the network security of their organization.

I’m once again pleased to partner with my colleague and OISF Director of Trainings and Academic Initiatives - Josh Stroschein, on a conference training session. Together, we invite you to our workshop at FloCon 2022 - “Intrusion Analysis and Threat Hunting with Open Source Tools” on 11 January at 1PM EST.

We will be using Suricata, the open source network security engine, to generate data, perform exhaustive traffic analysis, and develop comprehensive threat hunting strategies. We will demonstrate how to dig deep into your network traffic in order to identify key evidence that a compromise has occurred. And finally, we will provide a demonstration of how to analyze the threat and how to deal with new forms of attack, which will help you proactively search for evidence of new breaches in your own environment. 

Attendees will be walked through key phases of adversary tactics and techniques. By the end of the workshop, attendees should have the knowledge and skills necessary to discover new threats in their networks.

Register for FloCon 2022 and join Josh and me virtually on 11 January at 1PM EST. Please be aware that attendees should already be familiar with the basics of network security monitoring, IDS/IPS systems and Linux environments. The following documents could help with the preparation for the workshop:

We hope to see you there!

Note: if you want to be the first to know about Stamus Networks’ talks and events, please subscribe to our blog and follow us on our social media platforms.

Schedule a Demo of Stamus ND or Stamus NDR


Related posts

Introducing Suricata Language Server: Real-time Rule Syntax Checking and Auto-completion

Writing signatures for Suricata and other intrusion detection systems (IDS) is considered by many...

Feature Spotlight: Pivot from IDS Alert Metadata to Signature Details

Sometimes, even after extensive training, we forget about important features or ways of using a...

Suricata to the Log4j Rescue

Following the 10-December-2021 announcement of (CVE-2021-44228), Log4shell scanners have begun to...