Vaughn will discuss using freely available tools and logs you are already collecting to detect attacker behavior. Vaughn has a cookbook that will allow you to configure and analyze logs to detect attacks in your environment. You don't need anything fancy to detect attacks, use what you have along with freely available tools and techniques!
Follow us on Twitter: https://www.twitter.com/securityweekly
[audio src="http://traffic.libsyn.com/sw-all/Detecting_Attacker_Behavior_LogRhythm_-_Pauls_Security_Weekly_587_converted.mp3" ]