Finding Bad Guys Using Math and Statistics
Register to Watch
Plus, we'll send you relevant content.
Using enrichment to turn low-value events into high-value events. Enrichment techniques are geoip, tld extraction, length, and entropy. I then demonstrate how to find anomalous stuff like: drive-by malware / malicious web browsing Command and Control (C2) Communications DNS tunneling Data Exfiltration
Jared has 15 years of experience optimizing and improving the security posture of SOCs for Federal and commercial customers worldwide. His background in systems engineering and software development helps customers realize the full potential of their big data solutions. Jared enjoys pushing the boundaries of data visualizations, resulting in a number of side projects focused on immersive 3D data analytics.