In its early years, FloCon was an academic conference focused exclusively on network flow data but it has evolved into an annual event with a more broad focus “applying any and all collected data to defend enterprise networks.”
All the events give the attendees the opportunity to try different technologies, to use many tools and to learn from the experts in network security. This year, we will share our practical experiences that we hope will help attendees gain the skills to improve the network security of their organization.
I’m once again pleased to partner with my colleague and OISF Director of Trainings and Academic Initiatives - Josh Stroschein, on a conference training session. Together, we invite you to our workshop at FloCon 2022 - “Intrusion Analysis and Threat Hunting with Open Source Tools” on 11 January at 1PM EST.
We will be using Suricata, the open source network security engine, to generate data, perform exhaustive traffic analysis, and develop comprehensive threat hunting strategies. We will demonstrate how to dig deep into your network traffic in order to identify key evidence that a compromise has occurred. And finally, we will provide a demonstration of how to analyze the threat and how to deal with new forms of attack, which will help you proactively search for evidence of new breaches in your own environment.
Attendees will be walked through key phases of adversary tactics and techniques. By the end of the workshop, attendees should have the knowledge and skills necessary to discover new threats in their networks.
Register for FloCon 2022 and join Josh and me virtually on 11 January at 1PM EST. Please be aware that attendees should already be familiar with the basics of network security monitoring, IDS/IPS systems and Linux environments. The following documents could help with the preparation for the workshop:
- MITRE Attack Design and Philosophy by Blake Strom, et al
- The Diamond Model of Intrusion Analysis by Sergio Caltagirone, et al
- Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains by Eric Hutchins, et al
We hope to see you there!
Note: if you want to be the first to know about Stamus Networks’ talks and events, please subscribe to our blog and follow us on our social media platforms.