Loading…
FloCon 2018 has ended
Tucson, AZ – January 8-11, 2018

PLEASE NOTE THAT THE CURRENT SCHEDULE IS TENTATIVE. CHANGES TO THE SCHEDULE BELOW MAY OCCUR

Watch this space for details on the technical program for FloCon 2018. In the meantime, see the FloCon website at www.cert.org/flocon.
Training [clear filter]
Monday, January 8
 

8:30am MST

Morning Track I: How to be an Analyst
Limited Capacity seats available

This two session training covers basic skills necessary to be an effective cyber analyst. Analytic acumen or “how to think” is the topic for the morning session. This session will focus on the underlying analytical skillset. The session will start with an introduction to the analytic process and then cover logical fallacies and awareness of assumptions and biases. Practical application of portions of the analytic process will be the topic of the afternoon session. Here we will step into the shoes of Alex Smith, a SOC team lead for ACME Corporation, as he encounters a number of challenging situations. In each situation, you will dictate what actions Alex takes. These decisions have consequences as their outcomes could save or doom ACME Corporation.


Speakers
avatar for Angela Horneman

Angela Horneman

Network Intelligence Analyst, CERT - Software Engineering Institute
Angela Horneman is a Network Intelligence Analyst for the CERT division of the SEI. Her focus is on helping others understand network cyber security topics and solve related problems. They can then make better decisions, improve their security posture, and better interact in the cyber... Read More →
avatar for Don McKeon

Don McKeon

Junior Network Security Analyst, CERT - Software Engineering Institute
Donald McKeon is a Network Security Analyst for the CERT division of the SEI. His concentration is in developing  ways to have real time situational awareness of assets on any network. In order to properly defend a network, organizations must have a way to identify critical infrastructure... Read More →


Monday January 8, 2018 8:30am - 12:00pm MST
Turquoise I

8:30am MST

Morning Track II: Suricata Training
Limited Capacity seats available

Suricata, the world’s leading IDS/IPS engine, provides the most versatile network security tool available today. Developed and maintained by a core team of developers and an open source community, Suricata is the “Swiss Army Knife” for network security monitoring. This training will demonstrate the latest in Suricata’s dynamic capabilities including:

  • Introduction to the newest version of Suricata
  • Suricata as a passive DNS probe
  • Suricata as an SSL monitor
  • Suricata as a malware detection probe
  • Suricata as a flow probe
  • And some exciting new features…

At the completion of this training, attendees will gain a greater understanding of Suricata’s versatility and power. They will also have the unique opportunity to discuss any questions directly with members of the Suricata development team. 


Speakers
avatar for Eric Leblond

Eric Leblond

Developer, OISF
Eric is an active member of the security and open source communities. He is a Netfilter Core Team member working mainly on communications between kernel and userland. He works on the development of Suricata, the open source IDS/IPS network engine since 2009, and he is one of the... Read More →
avatar for Peter Manev

Peter Manev

QA Lead, OISF
A Suricata core team member - Peter has 15 years experience in the IT industry, including enterprise-level IT security practice. An adamant admirer and explorer of innovative open source security software Peter maintains some additional info points of interest about Suricata: htt... Read More →


Monday January 8, 2018 8:30am - 12:00pm MST
Coronado Ballroom I & II

8:30am MST

Morning Track III: Bro Training
Limited Capacity seats available

Bro is a stateful, protocol-aware, open source, high-speed network monitor with applications such as a next generation intrusion detection system, real-time network discovery tool, historical network analysis tool, real-time network intelligence, and more. With a powerful event-based programming language at its core, the Bro Platform ships with powerful frameworks-signature detection, the ability to extract and analyze files, and the capability to integrate massive amounts of local and external intel—all at incredibly high rates.

This tutorial focuses on helping you understand some of the many tasks that you can accomplish with the Bro Platform using a hands-on Virtual Machine. Beginning with an introduction to the Bro Platform, this fast-paced tutorial helps experienced network operators quickly get up to speed on leveraging the technology. Students work with traffic samples of distributed denial-of-service (DDoS) attacks, deploy large sets of threat intelligence, analyze compromised host traffic, dynamically generate streaming network analytics, and more.

Students should be well versed in TCP/IP and networking fundamentals and come prepared with an x86 x64 workstation (Linux, Windows, or Mac) to run the Bro training VM. A remote SSH-based host will be available for students who cannot run the VM.


Speakers
avatar for Liam Randall

Liam Randall

President, Critical Stack - A Division of Capital One Bank
Liam (@Hectaman) focuses on end-user training, application development, and community outreach. He is the CEO at Critical Stack, develops network solutions around the Bro Platform, and is a frequent speaker at security conferences. You can usually find him training users on the Bro... Read More →


Monday January 8, 2018 8:30am - 12:00pm MST
Turquoise II

1:00pm MST

Afternoon Track I: How to be an Analyst
Limited Capacity seats available

This two session training covers basic skills necessary to be an effective cyber analyst. Analytic acumen or “how to think” is the topic for the morning session. This session will focus on the underlying analytical skillset. The session will start with an introduction to the analytic process and then cover logical fallacies and awareness of assumptions and biases. Practical application of portions of the analytic process will be the topic of the afternoon session. Here we will step into the shoes of Alex Smith, a SOC team lead for ACME Corporation, as he encounters a number of challenging situations. In each situation, you will dictate what actions Alex takes. These decisions have consequences as their outcomes could save or doom ACME Corporation.


Speakers
avatar for Angela Horneman

Angela Horneman

Network Intelligence Analyst, CERT - Software Engineering Institute
Angela Horneman is a Network Intelligence Analyst for the CERT division of the SEI. Her focus is on helping others understand network cyber security topics and solve related problems. They can then make better decisions, improve their security posture, and better interact in the cyber... Read More →
avatar for Don McKeon

Don McKeon

Junior Network Security Analyst, CERT - Software Engineering Institute
Donald McKeon is a Network Security Analyst for the CERT division of the SEI. His concentration is in developing  ways to have real time situational awareness of assets on any network. In order to properly defend a network, organizations must have a way to identify critical infrastructure... Read More →


Monday January 8, 2018 1:00pm - 4:30pm MST
Turquoise I

1:00pm MST

Afternoon Track II: Threat Hunting w/Suricata
Limited Capacity seats available

In "Threat Hunting with Suricata" we will teach various methods and techniques to aid in detecting and hunting for popular threats facing organizations today. This workshop will focus on writing efficient IDS rules for hunting and detecting threats, as well as discussing strategies around leveraging Suricata alerts in this context.

Attendees will gain invaluable insight into the techniques behind creating long lasting efficient rules for Suricata IDS. Lab exercises will train attendees how to analyze and interpret hostile network traffic into agile IDS rules for detecting threats, including but not limited to: Exploit Kits, Ransomware, Phishing Attacks, Crimeware, Backdoors, Targeted Threats, and more. Attendees will leave the class armed with the knowledge of how to write quality Suricata IDS signatures for their environment, enhancing their organization’s ability to respond and detect threats.


Speakers
avatar for Jack Mott

Jack Mott

Security Researcher - Emerging Threats Research Team, OISF Core Team / Emerging Threats
Jack is a Security Researcher on the Emerging Threats Research team at Proofpoint where he spends all day long in packet-land playing with malware and writing comprehensive IDS rules for the ETPRO and OPEN ruleset. In addition to IDS sigs, writes sigs for ClamAV and Yara to hunt... Read More →
avatar for Jason Williams

Jason Williams

Security Researcher - Emerging Threats Research Team, OISF Core Team / Emerging Threats
Jason is a Security Researcher on the Emerging Threats Research team at Proofpoint where he flops around in a metaphorical ball pit of network packets all day and night. He works on the ETPRO and OPEN rulesets, having written thousands of signatures to help defenders protect their... Read More →


Monday January 8, 2018 1:00pm - 4:30pm MST
Coronado Ballroom I & II

1:00pm MST

Afternoon Track III: Bro Training
Limited Capacity seats available

Bro is a stateful, protocol-aware, open source, high-speed network monitor with applications such as a next generation intrusion detection system, real-time network discovery tool, historical network analysis tool, real-time network intelligence, and more. With a powerful event-based programming language at its core, the Bro Platform ships with powerful frameworks-signature detection, the ability to extract and analyze files, and the capability to integrate massive amounts of local and external intel—all at incredibly high rates.

This tutorial focuses on helping you understand some of the many tasks that you can accomplish with the Bro Platform using a hands-on Virtual Machine. Beginning with an introduction to the Bro Platform, this fast-paced tutorial helps experienced network operators quickly get up to speed on leveraging the technology. Students work with traffic samples of distributed denial-of-service (DDoS) attacks, deploy large sets of threat intelligence, analyze compromised host traffic, dynamically generate streaming network analytics, and more.

Students should be well versed in TCP/IP and networking fundamentals and come prepared with an x86 x64 workstation (Linux, Windows, or Mac) to run the Bro training VM. A remote SSH-based host will be available for students who cannot run the VM.


Speakers
avatar for Liam Randall

Liam Randall

President, Critical Stack - A Division of Capital One Bank
Liam (@Hectaman) focuses on end-user training, application development, and community outreach. He is the CEO at Critical Stack, develops network solutions around the Bro Platform, and is a frequent speaker at security conferences. You can usually find him training users on the Bro... Read More →


Monday January 8, 2018 1:00pm - 4:30pm MST
Turquoise II
 
Filter sessions
Apply filters to sessions.