Security Onion Conference 2020
Oct 16, 2020 Online
Security Onion Conference 2020 has concluded. Check below for recordings, pictures, and more from past conferences!
Who Should Attend
If you use, or are considering using Security Onion, then you should attend Security Onion Conference! Find out what's new with Security Onion, learn best practices and exchange ideas with other users.
If you're generally interested in things like intrusion detection, network security monitoring, enterprise security monitoring, log management, hunting, and blue teaming, then you should consider attending Security Onion Conference!
Past Conferences
Security Onion Conference 2020
Oct 16, 2020 Online
Presentations
Information and Announcements about Security Onion
Mike Reeves &
Doug Burks
Security Onion 2 Demo
Doug Burks
Security Onion Conference 2019
Oct 18, 2019 Augusta, GA
Presentations
Augmenting the Onion: Facilitating Enhanced Detection and Response with Open Source Tools
Wes Lambert
Creativity, Intelligence, and Security Analyst Thinking Modes
Chris Sanders &
Stef Rand
Constructing Your Playbook within Security Onion
Josh Brower
Building a Detection Lab with SecurityOnion
Wylie Bayes
Finding traffic anomalies using SSL certificates
Bryant Treacle
Peeling Back the Layers: Using Security Onion to See Adversary Activity through All Phases of the Kill Chain
Benjamin Klimkowski &
Sean Eyre
State of the Onion
Doug Burks
Security Onion Conference 2018
Oct 22, 2018 Augusta, GA
Presentations
Save Time with Modern Filtering Techniques
Mark Jeanmougin
Blue, Red, Purple, White: Which team are you on?
Don Murdoch
Welcome to Georgia Cyber Center
Todd Gay
Pcaps Ahoy!
Brad Duncan
Integrating Osquery into Security Onion
Josh Brower
Getting the Most out of Freq and Domain_Stats
Mark Baggett
Introduction to Data Analysis
David Bianco
State of the Onion
Doug Burks &
Mike Reeves
Security Onion Conference 2017
Sep 18, 2017 Augusta, GA
Presentations
Arming Small Security Programs: Network Baseline Generation and Alerts with Bropy
Matt Domko
Building your Sec Ops Use Case
Don Murdoch
Snort: History and Vision
Joel Esler
Orchestrating into SO-OODA
Rob Gresham
Pivoting Effectively to Catch More Bad Guys
Chris Sanders
State of the Onion
Doug Burks
Security Onion Conference 2016
Sep 13, 2016 Augusta, GA
Presentations
C2 Phone Home: Leveraging Security Onion to Identify C&C Channels
Eric Conrad
ICS/SCADA Network Security Monitoring in Difficult Scenarios
Robert M. Lee
Uncovering Persistence With Autoruns & Security Onion
Josh Brower
The Investigation Labyrinth
Chris Sanders
ELSA 2.0
Martin Holste
Practical Cyborgism: Machine Learning for Bro Logs
Chris McCubbin
My Use of Security Onion as a researcher
Brad Duncan
Simplifying Home Security with CHIVE
Nathan Crews &
Tanner Payne
State of the Onion
Doug Burks
Security Onion Conference 2015
Sep 11, 2015 Augusta, GA
Presentations
Looking Back Over a Quarter Century of Network Monitoring
Todd Heberlein
Detect it Once
Seth Hall
Security Event Data in the OODA Loop Model
Martin Holste
Industrially Hardened Security Onion Sensor
Chris Sistrunk
Using Sysmon to Enrich Security Onion's Host-Level Capabilities
Josh Brower
Threat Intel Powered IDS
Chris Montgomery
Security Onion Conference 2014
Sep 12, 2014 Augusta, GA
Presentations
Keynote Speech
Richard Bejtlich
Why I Built Snorby and the Future of Security Interfaces
Dustin Webber
SQUERT - An Open Source Web Interface for NSM Data
Paul Halliday
ELSA
Martin Holste
Scaling Security Onion to the Enterprise
Mike Reeves
The Security Onion Cloud Client
Josh Brower
Using Flow Data Effectively
Chris Sanders &
Jason Smith
Learn Analysis and Forensics for Free** with Security Onion
Ben Knowles
Custodiet MSSP Framework
Tim Krabec
Contributing to Security Onion
Scott Runnels
State of the Onion, Q&A, Closing Remarks
Doug Burks