Richard Bejtlich

Network Security Monitoring

How-To Implement a Security Strategy That Wins Against a Variety of Intruders

Date: This event took place live on February 19 2014

Presented by: Richard Bejtlich

Duration: Approximately 60 minutes.

Cost: Free

Is your network safe from intruders? Do you know how to find out? Do you know what to do when you learn the truth? In this Webcast Richard Bejtlich, CSO of Mandiant, will describe Network Security Monitoring, a methodology he learned and developed in the Air Force to detect and respond to intruders. His latest book, The Practice of Network Security Monitoring, contains Richard's latest thinking on the subject, as well as an introduction to the premier open source NSM distribution, Security Onion.

Richard will show how NSM can help you implement a security strategy that wins against a variety of intruders, based on fast, comprehensive, and accurate incident detection, response, and containment.

About Richard Bejtlich

Richard Bejtlich is Chief Security Officer at MANDIANT. He was previously Director of Incident Response for General Electric, where he built and led the 40-member GE Computer Incident Response Team (GE-CIRT). Prior to GE, he operated TaoSecurity LLC as an independent consultant, protected national security interests for ManTech Corporation's Computer Forensics and Intrusion Analysis division, investigated intrusions as part of Foundstone's incident response team, and monitored client networks for Ball Corporation.

Richard began his digital security career as a military intelligence officer in 1997 at the Air Force Computer Emergency Response Team (AFCERT), Air Force Information Warfare Center (AFIWC), and Air Intelligence Agency (AIA).

Richard is a graduate of Harvard University and the United States Air Force Academy. He wrote "The Tao of Network Security Monitoring" and "Extrusion Detection," and co-authored "Real Digital Forensics." His latest book is "The Practice of Network Security Monitoring" (nostarch.com/nsm). He also writes for his blog (taosecurity.blogspot.com) and Twitter (@taosecurity), and teaches for Black Hat.

Questions? Please send email to