As an enthusiastic member of the security and data analytics community, I have been asked on a number of occasions to speak at user groups, conferences and other events.
The below represents many of the presentations and associated slides decks where they have been recorded and maintained.
Presentations
Hunting Hard, Failing Fast, Maintaining Integrity
Big Data for Cybersecurity Conference, May 2018
Human Vulnerability: Truths & Lessons
Security Scotland Meet Up, May 2018
Splunk Enterprise Security Content Updates
Splunk User Group Edinburgh, May 2018
Securing the Cloud (AWS) with Splunk
Splunk User Group Edinburgh, August 2017
Deconstructing the SIEM Platform
Security Scotland Meetup, August 2017
International Conference on Big Data and Cyber Security, May 2017
User Behavioural Analytics (UBA): Machine Learning for Threat Detection
International Conference on Big Data and Cyber Security, May 2016
Slide Decks
2018
- Hunting Hard, Failing Fast, Maintaining Integrity
The slides used at the Big Data for Cybersecurity Conference at Napier University. - Human Vulnerability: Truths & Lessons
The slides used at the Security Scotland Meetup event at Skyscanner. - Big Data For Threat Detection & Response
The slides used at the SIGINT meetup to share thoughts of the use of big data for threat detection, hunting and response. - Analyst, Engineer or Consultant?
The slides used at the March 2018 OWASP Edinburgh meetup to share a look at common roles within cybersecurity from the perspective of a Managing Consultant who’s been through several in quick succession and an introspective analysis of what makes a successful cybersecurity professional. - TSTAS, the Life of a Splunk Trainer and using DevOps in Splunk Development
The slides used at the March 2018 Splunk User Group Edinburgh session to discuss using TSTATS and the internal Splunk logs, have a Splunk Trainer share his journey with Splunk and how he’s managed to achieve every possible Splunk certification (over 10!), and a short discussion about emerging thoughts of using development/release frameworks with Splunk deployments. - What is Security Engineering?
The slides used at the February Cyber Scotland Connect session. - The Missing Layers: Syslog Collection & HTTP Event Collection (HEC)
The slides used at the January 2018 Splunk User Group Edinburgh session to discuss the [often] missing layers of event collection within Splunk deployments. The ins and outs of traditional syslog collection and also explored how the Splunk HTTP Event Collector can be used to similar effect.
2017
- Latest Updates to Splunk from .conf 2017
The slides used at the October 2017 Splunk User Group Edinburgh session to detail some of the best announcements from the recent Splunk users conference. - Securing the Enterprise/Cloud with Splunk at the Centre
The slides used at the August 2017 Splunk User Group Edinburgh session to cover the topics of using Splunk to secure the Cloud (AWS), then coving a number of use cases or orchestration with Adaptive Response. - Deconstructing SIEM: What are SIEM platforms made of and why are frameworks so important?
The slides used at the August 2017 Security Scotland Meetup event to cover the topics of what SIEM’s are and why they’re so important. - Supporting Splunk at scale, Splunking at home & introduction to Enterprise Security
The slides used at the June 2017 Splunk User Group Edinburgh session to cover the topics of supporting Splunk within a large enterprise, using Splunk to gather and report on personal email metadata and an introduction to Splunk Enterprise Security. - Building Splunk Apps, development paths with Splunk User Behaviour Analytics (UBA)
The slides used at the April 2017 Splunk User Group Edinburgh session to cover the topics of building Apps, the various education/certification development paths and exploring Splunk User Behaviour Analytics (UBA). - Splunk dashboarding & Universal Vs. Heavy Forwarders
The slides used at the February 2017 Splunk User Group Edinburgh session to cover the topics of dashboarding techniques and when to use Universal Forwarders vs. Heavy Forwarders.
2016
- Splunk IT operations & use case development
The slides used at the November 2016 Splunk User Group Edinburgh session to cover the topics of IT operations using Splunk IT Service Intelligence and explaining the importance of Use Case Development following set processes and procedures. - Splunk deployment & security
The slides used at the September 2016 Splunk User Group Edinburgh session to cover the topics of large-scale Splunk deployments and how to secure Splunk within an enterprise. - User Behavioural Analytics (UBA): Machine Learning for threat detection
The slides used at the May 2016 Big Data Scotland event in Edinburgh held in to cover User Behavioural Analytics and using it to detect network and host-based attacks.