Want the world's best threat hunting data? You need Zeek.
You will discover how to:
- Use rich, structured network data (35+ protocols, 400+ data fields captured in real time) to find answers
- Dramatically expand your threat hunting capabilities
- Get the most out of Zeek data in Splunk
Speakers
Roger Cheeks
Solution Engineer
Roger Cheeks is a Solution Engineer at Corelight has spent more than 20 years designing, implementing, and maintaining mission critical network and security systems. He is an expert in network analysis techniques and protocols including packets, flow, Zeek, and logs. Roger spent more than ten years architecting and implementing Splunk for Security Operations, and has supported verticals including financial, healthcare, entertainment, and more.
Richard Chitamitre
Senior Sales Engineer, Corelight
Richard Chitamitre is a technology evangelist at Corelight. Prior to that he worked as a Senior Security Analyst at Edward Jones and before that spent over a decade serving in the U.S. Navy across a number of cybersecurity roles, including work on the Tailored Access Operations team and Navy CMT.Ed Smith
Director, Alliances - Corelight
Edward Smith is a dynamic leader with over 15 years of experience in the technology sector, with a focus on cybersecurity. Currently serving as Alliances Director at Corelight, Edward excels in helping customers solve problems and maximize value through technology integrations and strategic partnerships.