Detection as Code
Details
This month's talk is by throwaway2155 and is all about the threat hunting... Turning detections into repeatable, version controlled, and tested artifacts. The demo will use python, git, and elk but the techniques can be used with any code forge, programming language, and SIEM.
We'll have an hour of content followed by an hour of networking at Fassler Hall. Come be part of the Central Arkansas cybersecurity community.
