Speaking

As an enthusiastic member of the security and data analytics community, I have been asked on a number of occasions to speak at user groups, conferences and other events.

The below represents many of the presentations and associated slides decks where they have been recorded and maintained.

Presentations

Securing the Cloud (AWS) with Splunk

Splunk User Group Edinburgh, August 2017

Deconstructing the SIEM Platform

Security Scotland Meetup, August 2017

International Conference on Big Data and Cyber Security, May 2017

User Behavioural Analytics (UBA): Machine Learning for Threat Detection

International Conference on Big Data and Cyber Security, May 2016

Slide Decks

2018

  • Big Data For Threat Detection & Response
    The slides used at the SIGINT meetup to share thoughts of the use of big data for threat detection, hunting and response. 
  • Analyst, Engineer or Consultant?
    The slides used at the March 2018 OWASP Edinburgh meetup to share a look at common roles within cybersecurity from the perspective of a Managing Consultant who’s been through several in quick succession and an introspective analysis of what makes a successful cybersecurity professional.
  • TSTAS, the Life of a Splunk Trainer and using DevOps in Splunk Development
    The slides used at the March 2018 Splunk User Group Edinburgh session to discuss  using TSTATS and the internal Splunk logs, have a Splunk Trainer share his journey with Splunk and how he’s managed to achieve every possible Splunk certification (over 10!), and a short discussion about emerging thoughts of using development/release frameworks with Splunk deployments.
  • What is Security Engineering?
    The slides used at the February Cyber Scotland Connect session. 
  • The Missing Layers: Syslog Collection & HTTP Event Collection (HEC)
    The slides used at the January 2018 Splunk User Group Edinburgh session to discuss the [often] missing layers of event collection within Splunk deployments. The ins and outs of traditional syslog collection and also explored how the Splunk HTTP Event Collector can be used to similar effect.

2017

2016

  • Splunk IT operations & use case development
    The slides used at the November 2016 Splunk User Group Edinburgh session to cover the topics of IT operations using Splunk IT Service Intelligence and explaining the importance of Use Case Development following set processes and procedures. 
  • Splunk deployment & security
    The slides used at the September 2016 Splunk User Group Edinburgh session to cover the topics of large-scale Splunk deployments and how to secure Splunk within an enterprise. 
  • User Behavioural Analytics (UBA): Machine Learning for threat detection
    The slides used at the May 2016 Big Data Scotland event in Edinburgh held in to cover User Behavioural Analytics and using it to detect network and host-based attacks.