- Wednesday, March 18th, 2020 at 3:30 PM EST (19:30:00 UTC)
- John Hubbard
You can now attend the webcast using your mobile device!
Let’s face it, a well-run cyber defense operation doesn’t often meet the definition of inexpensive by any standards, but does it necessarily require many thousands of dollars in fancy vendor tools?
With the maturation of open source tools, the answer to that question is now a definite “no”, but many organizations continue to willingly subject themselves to high cost, mediocre performing commercial tools. While there are some half-baked open source projects out there, organizations are missing out on a wealth of opportunity by assuming this is the case for all open-source software. Free and open-source cyber defense tools have come a long way in the last few years. Don’t believe me? In every single Blue Team Fundamentals class I’ve run, multiple students have said they love the free tools we use in class and comment on how they are nicer than the expensive solutions they use at work!
If you’re sick of paying top dollar to use tools you only sort-of enjoy, come learn how the new breed of awesome open source security tools can not only save you money but improve your defenses!
This presentation will walk through the components of mounting a competent cyber defense operation and show how there are now outstanding open-source tools to address every piece. Join me to see how you can not only save money by utilizing the best of breed defense open source tools, but also improve your capabilities, visibility, and efficiency along the way!
John Hubbard is a certified SANS instructor who authored the new SEC450: Blue Team Fundamentals: Security Operations and Analysis and co-authored SEC455: SIEM Design and Implementation. As an active security operations center lead and dedicated blue team member, he has firsthand knowledge of what it takes to defend an organization against advanced cyberattacks. John specializes in threat hunting, tactical SIEM design and optimization, and tailoring security operations to enable organizations to protect their most sensitive data.