This page was created based on publicly available data without event host participation.
If you represent Security Onion - please contact us
If you represent Security Onion - please contact us
About the Event
Topic:
Cybersecurity
If you use Security Onion, then you should definitely make plans to attend Security Onion Conference! Even if you don’t use Security Onion, most talks provide value beyond just Security Onion itself. So if you’re generally interested in things like intrusion detection, network security monitoring, enterprise security monitoring, log management, hunting, and blue teaming, then you should consider watching Security Onion Conference!
Share
Featured Speakers
Joshua Brower
Senior Engineer at Security Onion Solutions, LLC
Josh has been crashing computers since his teens, and now feels fortunate to be doing it professionally. He has spent the last decade focusing on Information Security, particularly network and endpoint detection. He also enjoys teaching around InfoSec issues, especially to non-technical learners - helping them to understand how their actions in the digital world have real-world consequences, as well as how to proactively reduce the risk.
David Bianco
Incident Detection & Response Specialist at Target
I've been involved in computer and network security for 15 years, and have led consulting engagements with Fortune 500 companies, Wall Street firms, public utilities and major universities.
I'm also an accomplished writer and speaker. I've presented at several industry conferences, written sections of courseware for the SANS Institute and have been a contributing editor for "Information Security Magazine."
I hold several security certifications, including CISSP, GSEC, GCUX and GCIH.
Specialties: Penetration testing, ethical hacking, IT security auditing, vulnerability assessment, incident response, hacking techniques, Intrusion Detection/Network Security Monitoring (NSM), wireless security, security training
I'm also an accomplished writer and speaker. I've presented at several industry conferences, written sections of courseware for the SANS Institute and have been a contributing editor for "Information Security Magazine."
I hold several security certifications, including CISSP, GSEC, GCUX and GCIH.
Specialties: Penetration testing, ethical hacking, IT security auditing, vulnerability assessment, incident response, hacking techniques, Intrusion Detection/Network Security Monitoring (NSM), wireless security, security training
Don Murdoch
Senior Security Engineer at Blue Cross Blue Shield Association
D, James Murdoch, GSE #99, MSISE, MBA is a seasoned IT/InfoSec leader with over 20 years of multidisciplinary IT, management, security architecture/engineering, and Incident Response experience.
Don is currently leveraging that experience at the Regent University Cyber Range to raise up the next generation of blue team defenders and evaluating products for best fit.
Don is the author of the Blue Team Handbook: Incident Response edition, #3 of 100 Best Cyber Security Books of All Time on bookauthority.com and BThB: SOC, SIEM, and Threat Hunting, a 5 star book changing SOC's worldwide. BTHb:SOCTH is adopted by many SOC teams and is reshaping how those teams conduct business.
The first half of Don’s career emphasized software development, network and systems management, and database administration. At his career midpoint, he worked as the Information Systems Security Officer for Old Dominion University in Virginia, where he spent most of his days in the Wild, Wild West of academic computing and put most of his SANS education to the test. For the remainder of his career, Don has worked in computer, network, and information security as the lead Security Engineer/Security Architect, and then Director for the Strategy and Planning team for the Infrastructure division within a Fortune 500 Medicaid focused Insurance company, and lastly as the Director of a MSSP organization where his team developed, deployed, and managed a 24/7 SOC for numerous clients.
Don is currently leveraging that experience at the Regent University Cyber Range to raise up the next generation of blue team defenders and evaluating products for best fit.
Don is the author of the Blue Team Handbook: Incident Response edition, #3 of 100 Best Cyber Security Books of All Time on bookauthority.com and BThB: SOC, SIEM, and Threat Hunting, a 5 star book changing SOC's worldwide. BTHb:SOCTH is adopted by many SOC teams and is reshaping how those teams conduct business.
The first half of Don’s career emphasized software development, network and systems management, and database administration. At his career midpoint, he worked as the Information Systems Security Officer for Old Dominion University in Virginia, where he spent most of his days in the Wild, Wild West of academic computing and put most of his SANS education to the test. For the remainder of his career, Don has worked in computer, network, and information security as the lead Security Engineer/Security Architect, and then Director for the Strategy and Planning team for the Infrastructure division within a Fortune 500 Medicaid focused Insurance company, and lastly as the Director of a MSSP organization where his team developed, deployed, and managed a 24/7 SOC for numerous clients.
See all speakers
Watch
Featured Sessions
Available
In cart
Free
Free
Free
Free
Free
Free
Security Onion Conference 2018: State of the Onion by Doug Burks and Mike Reeves
Available
In cart
Free
Free
Free
Free
Free
Free
Mark Jeanmougin
Security Engineer at SAP Concur
Available
In cart
Free
Free
Free
Free
Free
Free
Security Onion Conference 2018: Save Time with Modern Filtering Techniques by Mark Jeanmougin
Available
In cart
Free
Free
Free
Free
Free
Free
Doug Burks
Founder and CEO at Security Onion Solutions, LLC
Available
In cart
Free
Free
Free
Free
Free
Free
Security Onion Conference 2019: Welcome and Opening Remarks
Available
In cart
Free
Free
Free
Free
Free
Free
see all (9)
Get access to videos
Access to all the recordings of the event
Get access to all videos “Security Onion Conference 2019”
Available
In cart
Free
Free
Free
Free
Free
Free
Ticket
Share
Our other topics
Similar conferences
more
Event Organizer

Conference Cast
With ConferenceCast.tv, you get access to our library of the world's best conference talks.

951 conferences
37820 speakers
14451 hours of content
Never miss another conference on this topic
Subscribe
Subscribed