התחל במצב לא מקוון עם האפליקציה Player FM !
Improving Analytics Using Enriched Network Flow Data
Manage episode 361742674 series 1264075
Classic tool suites that are used to process network flow records deal with very limited detail on the network connections they summarize. These tools limit detail for several reasons: (1) to maintain long-baseline data, (2) to focus on security-indicative data fields, and (3) to support data collection across large or complex infrastructures. However, a consequence of this limited detail is that analysis results based on this data provide information about indications of behavior rather than information that accurately identifies behavior with high confidence. In this webcast, Tim Shimeall and Katherine Prevost discuss how to use IPFIX-formatted data with detail derived from deep packet inspection (DPI) to provide increased confidence in identifying behavior.
166 פרקים
Manage episode 361742674 series 1264075
Classic tool suites that are used to process network flow records deal with very limited detail on the network connections they summarize. These tools limit detail for several reasons: (1) to maintain long-baseline data, (2) to focus on security-indicative data fields, and (3) to support data collection across large or complex infrastructures. However, a consequence of this limited detail is that analysis results based on this data provide information about indications of behavior rather than information that accurately identifies behavior with high confidence. In this webcast, Tim Shimeall and Katherine Prevost discuss how to use IPFIX-formatted data with detail derived from deep packet inspection (DPI) to provide increased confidence in identifying behavior.
166 פרקים
כל הפרקים
×
1 An Introduction to the MLOps Tool Evaluation Rubric 1:00:23

1 The State of DevSecOps in the DoD: Where We Are, and What’s Next 58:42

1 I Spy with My Hacker Eye: How Hackers Use Public Info to Crack Your Creds 57:16

1 A New Performance Zone for Software for National Security 1:02:23

1 Identifying and Mitigating Cyber Risk 47:33

1 Cyber Maturity Model Certification (CMMC): Protecting the Nation’s Defense Industrial Base 28:02

1 Threat Hunting: What Should Keep All of Us Up at Night 57:09

1 Can a Cybersecurity Parametric Cost Model be Developed? 56:25

1 Elements of Effective Communications for Cybersecurity Teams 34:00

1 Operational Resilience Fundamentals: Building Blocks of a Survivable Enterprise 52:07

1 Cybersecurity Priorities in 2025 32:21

1 Understanding the Need for Cyber Resilience: A Conversation with Ray Umerley 53:02

1 Exploring the Fundamentals of Counter AI 27:57

1 Cyber Challenges in Health Care: Managing for Operational Resilience 53:37

1 Independent Verification and Validation for Agile Projects 1:02:23
ברוכים הבאים אל Player FM!
Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.