Know Where You’re Putting Your Tool – Paul’s Security Weekly #587
This week, we welcome Vaughn Adams, Enterprise Sales Engineer at LogRhythm! Vaughn will be talking about using freely available tools and logs you are already collecting to detect attacker behavior! In our second segment, we have a Round Table discussion entitled "What the Heck Are Security Basics?", to talk about what should organizations be doing to meet the basic security requirements, and much more! In our final segment, we air a pre-recorded interview with Mandy Logan on "Hacking the Brainstem", her trip through recovery, and how she came to love Information Security! Full Show Notes: https://wiki.securityweekly.com/Episode587 Visit https://www.securityweekly.com/psw for all the latest episodes! To get involved with LogRhythm, go to: www.securityweekly.com/logrhythm Support Mandy by going to her GoFundMe Page: https://www.gofundme.com/hacking-recovery-brainstem-stroke Visit https://www.activecountermeasures/psw to sign up for a demo or buy our AI Hunter! Follow us on Twitter:
Full Audio
Segments
1. Detecting Attacker Behavior, LogRhythm –
Vaughn will discuss using freely available tools and logs you are already collecting to detect attacker behavior. Vaughn has a cookbook that will allow you to configure and analyze logs to detect attacks in your environment. You don't need anything fancy to detect attacks, use what you have along with freely available tools and techniques!
To get involved with LogRhythm, go to: securityweekly.com/logrhythm
Full Show Notes: https://wiki.securityweekly.com/Episode587
Host

2. What The Heck Are “Security Basics”? –
The question comes up quite often, what should organizations be doing to meet the basic security requirements? We often hear the terms "Security Basics", "Minimum Security Standards" or dear lord "Security Hygiene". But what does all this mean? Is it the same for everyone? People will point to different resources that attempt to define the security basics, but do they really work? Does compliance play into this picture?
Full Show Notes: https://wiki.securityweekly.com/Episode587
Hosts






3. Hacking the Brainstem, Mandy Logan –
Following a series of 5 strokes and major head injuries, Mandy is no longer in the construction engineering industry. Instead, she is pursuing all things InfoSec with an emphasis on Incident Response, Neuro Integration, Artificial General Intelligence, sustainable, ethical neuro tech, and improving the lives and community of InfoSec professionals and Neurodiverse professionals. She enjoys art, requires loads of rest still, and hopes to be half the person her service dog, Trevor, is.
Full Show Notes: https://wiki.securityweekly.com/Episode587
Host

4. Hacking the Brainstem, Mandy Logan – Paul’s Security Weekly #587
Following a series of 5 strokes and major head injuries, Mandy is no longer in the construction engineering industry. Instead, she is pursuing all things InfoSec with an emphasis on Incident Response, Neuro Integration, Artificial General Intelligence, sustainable, ethical neuro tech, and improving the lives and community of InfoSec professionals and Neurodiverse professionals. She enjoys art, requires loads of rest still, and hopes to be half the person her service dog, Trevor, is. Support Mandy by going to her GoFundMe Page: https://www.gofundme.com/hacking-recovery-brainstem-stroke Full Show Notes: https://wiki.securityweekly.com/Episode587 Follow us on Twitter: https://www.twitter.com/securityweekly
5. What The Heck Are “Security Basics”? – Paul’s Security Weekly #587
The question comes up quite often, what should organizations be doing to meet the basic security requirements? We often hear the terms "Security Basics", "Minimum Security Standards" or dear lord "Security Hygiene". But what does all this mean? Is it the same for everyone? People will point to different resources that attempt to define the security basics, but do they really work? Does compliance play into this picture? Full Show Notes: https://wiki.securityweekly.com/Episode587 Follow us on Twitter: https://www.twitter.com/securityweekly
6. Detecting Attacker Behavior, LogRhythm – Paul’s Security Weekly #587
Vaughn will discuss using freely available tools and logs you are already collecting to detect attacker behavior. Vaughn has a cookbook that will allow you to configure and analyze logs to detect attacks in your environment. You don't need anything fancy to detect attacks, use what you have along with freely available tools and techniques! To get involved with LogRhythm, go to: https://www.securityweekly.com/logrhythm Full Show Notes: https://wiki.securityweekly.com/Episode587 Follow us on Twitter: https://www.twitter.com/securityweekly