Hack Red Con 2024
-
End the Burnout - 3 things your CISO wishes you knew.
Mark Thacker
-
Doors, Cameras, and Mantraps: Oh, my!
Dylan "The Magician" Baklor
-
Registration Opens
Oct. 25
-
Opening Ceremony
Oct. 25
-
Keynote Round Table - Ed Skoudis, Dave Kennedy, Ken Nevers, Amanda Berlin
Oct. 25
-
Intro to Infrastructure Automation for Offensive Security
Alex MartirosyanOct. 25
-
Securing Derby 150
Jason PaytonOct. 25
-
Creating Intelligence From Malware Samples
Jon "Wally" Prather and Jeff SmealOct. 25
-
CISO Roundtable
Oct. 25
-
Tough Adversary? Don’t Blame Sun Tzu
Dr. Gregory CarpenterOct. 25
As a Senior Cyber Intelligence Analyst at UPS, I help protect the company's network, employees, and data from cyber threats, using my core competencies in cyber threat intelligence (CTI), and incident response.
I work with a team of cyber security professionals to monitor, analyze, and respond to cyber incidents, and to provide actionable and timely intelligence to stakeholders. I am passionate about cyber security and its impact on national and global security, and I strive to continuously learn and improve my skills in the field.
Welcome, cyber defenders, to 'Free Enterprise Defense: Mastering Detection with Sysmon, SIEM, and CTI.' We've been busy revamping our Sysmon configuration and integrating it with our SIEM system, and boy, do we have some stories to tell. While we won’t share our config (for obvious reasons), we will share our strategies so you can effectively use them too!
If you’re like us, tools are a big part of the overall cost of running a defense. Whether you have all the latest and greatest tools or are balling on a budget in a small shop, Sysmon is a free tool that complements and supports any detection stack.
This talk will share what worked, what didn't, and how we turned our detection strategies into a well-oiled machine. Expect real-world scenarios and a dive into the CTI lifecycle. Whether you're a seasoned analyst or just starting out, there's something here for everyone. Let's get started and turn those cyber threats into mere annoyances.