threat-hunt

 

Learn how to hunt with Zeek + Sigma

You will learn how to:

  • Enhance threat hunting and detection capabilities using Sigma
  • Leverage Zeek-powered queries in your SIEM
  • Use Sigma rules along with Corelight’s Threat Hunting Guide
  • Quickly deploy Zeek in your environment

Speakers

Vince Stoffer

Field CTO, Corelight

Vince Stoffer is Field CTO at Corelight and previously held security engineering and network management positions at Lawrence Berkeley National Laboratory and before that served as a network security engineer at Reed College. Vince holds the CISSP, GCIH and GCIA certifications.

Mark Overholser

Sales Engineer, Corelight

Mark Overholser is a Security Engineer at Corelight where he helps organizations capture, interpret, and connect network security data. Mark brings more than twelve years experience in security, system administration, and infrastructure. Prior to Corelight, Mark was a Systems Engineer Specialist at Palo Alto Networks, a Consulting Engineer at LightCyber, and Information Security Team Lead at Medline Industries.