Главная
Study mode:
on
1
Intro
2
Security Information and Event Management (SIEM)
3
SIEM Use Cases and Users
4
Market Dynamics
5
Open Source Options
6
Data Types
7
Data Sources
8
Data collection methods
9
Data Parsing and Schemas
10
Enrichment Use Cases
11
Ingestion
12
Storage
13
Why Correlation?
14
Rule Based Correlation
15
Incident identification
16
Incident Workflow
17
How to build your own SIEM
Description:
Explore the intricacies of building an open-source Security Information and Event Management (SIEM) system in this 33-minute conference talk by Jonah Kowall from Logz.io. Dive into the world of security logging use cases, learning how to leverage Fluentd and Fluent Bit for effective threat detection and analysis. Discover the challenges of data collection and scale in SIEM systems, and gain insights into parsing diverse security data sources. Examine real-world examples of data collection systems used to consolidate security information into an open-source SIEM. Understand how extracting metrics from logs with Fluentd can enhance your organization's security posture. Explore the EFK Stack's role in log analytics, including collection, indexing, and storage processes. Learn about the centralized approach of SIEM for collection, enrichment, and analysis, while considering future trends in edge computing for faster action and reduced data volumes. Gain valuable knowledge on SIEM use cases, market dynamics, open-source options, data types, collection methods, parsing, schemas, enrichment, ingestion, storage, correlation techniques, incident identification, and workflow management to build your own SIEM system. Read more

Security Logging Use Cases: Building an Open-Source SIEM

CNCF [Cloud Native Computing Foundation]
Add to list
0:00 / 0:00