The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.
Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by Blueprint Studios, 2021-10-12 12:33:42

Graylog Flipbook

Graylog Flipbook

Aaron Sachs
Senior Support Engineer

Aaron Sachs is a banjo-playing, beer-brewing 10-year IT veteran who started his career in academia. When he's not getting nerd-sniped by a
customer problem at Graylog (usually around Elasticsearch these days), you can find him muttering to himself about the lack of square
corners in his old house.

Session - Pay (no) attention to that index behind the curtain

If you've ever wanted to learn more about tuning Graylog, in particular its index sets, look no further! This presentation covers tuning index
sets in a fun, approachable way that will leave you feeling like a true wizard.



Abe Abernethy
Training Engineer

Abe began his IT career writing shady price-undercutting web scrapers for a discount bookstore in the 90s, he graduated to getting in
trouble with local ISPs and went on to have a successful career in the Canadian Armed Forces. He left the forces to become the Network
Security Manager for the City of Oshawa, a former member of the MISA board, part-time college professor, and currently serves as the head
of Training for Graylog educating a variety of technical professionals on how to do cool things with Security Analytics.

Session 1- Paradise by your Dashboard Lights

Graylog trainer extraordinaire Abe Abernathy will guide you through a "crawl, walk, run" approach to visualizing your data, starting from
choosing the right visualization to building a rapid investigation tool that covers an entire process in moments.

Session 2- The Line Between Threat Hunting and Threat Detection

Real-world example from threat hunter and Graylog trainer, Adam "Abe" Abernethy who will provide expertise on building a successful
security strategy, supported by a balance between threat detection and threat hunting with specific techniques for each.



Andrea Vahl
Comedian

Andrea Vahl is an international speaker and comedian. She has performed at venues such as Comedy Works, The Denver Improv,
Comedy Festivals in Boston, Chicago, Las Vegas and Wichita and produces her own standup show called Moms Unhinged. She
wrote a book about Facebook and is a mother of 2 boys giving her an endless source of material.

Session 1 - Comedy and Cocktails

Grab a drink and put your feet up - join us for some comic relief with Andrea Vahl. In addition to being a Social Media Consultant,
Andrea regularly gets people to laugh and has performed at many events including the Women in Comedy Festival in Boston, World
Series of Comedy, Chicago Women’s Funny Fest.



Andy Grolnick
CEO

Andy brings over thirty years of experience building and leading high-growth technology businesses in enterprise software, security, and
storage. His focus on delivering high-value products, enabling customer success, and fostering strong company cultures has been a formula
for success.

Session 1 - Welcome and Keynote

Join us as we kickoff Graylog GO with a few words from CEO Andy Grolnick and a preview of things to come from CTO and Founder Lennart
Koopmann, then roll right into our keynote speaker Johnny Xmas.

Session 2- (Moderator) Solving Problems With Graylog IRL

Hear directly Graylog users on how they use Graylog to improve IT operations, identify security issues, and meet compliance mandates.



Ben Dowliing
CEO, IPinfo

Ben Dowling is the Founder & CEO of IPinfo , the leading source for IP address data that processes over 40 billion API requests per month
for more than 300,000 businesses and developers. Clients include Fortune 500 companies like Microsoft, Intel, Dell, CBS, Xerox, and John
Deere, among others. Dowling is a former Facebook engineer and former CTO of Calm.com, a market-leading app for sleep, meditation, and
relaxation. Dowling also founded host.io, a powerful and fast domain name data API built for cybersecurity, business intelligence, competitor
analysis, and market research.

Session - Location, Location, Location!

With IPinfo, you can pinpoint your users’ locations, customize their experiences, prevent fraud, ensure compliance, and so much more. Learn
more about using IPinfo with Graylog in this session with CEO and Founder Ben Dowling.



Brandon Bruce
Customer Engagement Manager

Brandon has been in the IT industry since 2014, having previously worked in restaurants. He began as a Linux System Administrator but has
also worked as Openstack Deployment Engineer, Customer Support Manager, and Director of Customer Support. Currently, he is the
Customer Engagement Manager who is handling the Open Insights offerings at Graylog.

Session - Gaining Insight Into Your Graylog Instance

Insider secrets from the Customer Support team on what configuration and performance metrics you should be monitoring. Includes a quick
demo of the new health module dashboards and Open Insights.



Dulani Wallace
Senior Technical Writer

Dulani Wallace is a Sr. Technical Writer here at Graylog. For over ten years, he’s worked with engineers across the globe to produce techni-
cal guides, onboarding plans, and online courses. Originally from the San Francisco Bay Area, he resides in Washington, DC with his wife,
7-year-old daughter, and bundles of nicely labeled auxiliary cables and mixers when time permits to record voiceovers and sound effects.

Session - Return with the Elixir: The Hero's Journey to Leveling Up Your Graylog Avatar

What if learning how to use a product could be as insightful as your favorite literary or cinematic hero? Inspired by game designer and
speaker Kathy Sierra, Dulani Wallace will help you build your path to becoming a Graylog expert.



Jeff Darrington
Senior Technical Marketing Manager

Jeff Darrington is Graylog's Senior Technical Marketing Manager. He is a long-time Graylog OS user with extensive experience in IT Operations, IT product solutions
deployment in Firewalls, Networking, VOIP, Physical security Controls, and many others.
Session - The Line Between Threat Hunting and Threat Detection
Real-world example from threat hunter and Graylog trainer, Adam "Abe" Abernethy who will provide expertise on building a successful security strategy, supported
by a balancebetween threat detection and threat hunting with specific techniques for each.
Session 2 - Go Hunting With Graylog
Let's follow our noses and see where the data takes us as Product Expert Jeff Darrington teaches you how to look for threats that evaded your traps using Graylog.



Jim Nitterauer
Expert Graylog User

Currently a Senior Security Engineer at Zix | AppRiver, his team is corporate security operations and compliance for the entire company. He
holds both CISSP and CISM certifications. He is also well-versed in ethical hacking and penetration testing techniques and has been involved
in technology for more than 20 years. Jim has presented at NolaCon, ITEN WIRED, BSides Las Vegas, BSides Atlanta, CircleCityCon, DEF
CON, DebryCon, CypherCon, BSides San Francisco, Blue Team Village at DEF CON, Blue Team Con and several smaller conferences. He
regularly attends national security conferences and is passionate about conveying the importance of developing, implementing, and main-
taining security policies for organizations as well as using tools like Graylog to improve security and compliance. His talks convey unique
and practical techniques that help attendees harden their security in practical and easy-to-deploy ways.

Session 2- Solving Problems With Graylog IRL

Normal user actions become much more interesting if you know that the user left the company a month ago. Source IP addresses are
meaningless unless you know they come from an unusual location or are on a known watchlist. Learn the ins and outs of data enrichment
and lookup tables in Graylog.



Joe Gross
Director of Solution Engineering

Joe Gross joined Graylog as a solution engineer in December of 2019, before becoming the Director of Solution Engineering in July of 2021.
Prior to Graylog he held a number of different jobs all across the tech space. Joe graduated from Appalachian State University with degrees
in Business Administration and Computer Information Systems. Joe lives in Cary, North Carolina.

Session - The Line Between Threat Hunting and Threat Detection

Real-world example from threat hunter and Graylog trainer, Adam "Abe" Abernethy who will provide expertise on building a successful
security strategy, supported by a balance between threat detection and threat hunting with specific techniques for each.

Session 2 - Unlocking the value of Graylog

Every organization is somewhere on the log management continuum, and every organization is collecting logs. Collecting logs is the act.
Knowing what you want to do with those logs is the vision. Sit down with lead Solution Engineer, Joe Gross, to assess where you are on the
continuum, where you need to be, and how to get from here to there.



Johnny X-Mas
Keynote Speaker

Johnny Xmas is a predominant personality in the Information Security community, most well-known for his work on the TSA Master Key
leaks, his co-founding of the BurbSec community meetups and his nearly 20-year tenure as a global Information Security speaker. Currently
working with the security firm GRIMM (https://grimm.rip) to train the next generation of critical infrastructure incident responders, Johnny
has held nearly every role there is to be had in the industry. His infamous mixture of humor, raw sincerity and honest love of people lead to
humorously candid discussions on every topic.

Session - Couch to Compromise.

This talk will "reveal the magician’s secrets" on many "low-hanging fruit" hackers used to compromise enterprises in 2020. This will be a
candid, detailed, step-by-step how-to attack chain walkthrough, explaining how and why the attacks work, and what steps can
be taken to proactively defend against them. Participants will walk away with highly actionable tasks to immediately take to work on
Monday to not only bump their security posture up a distinctive notch with little to no hit on their budgets but also inherently render future
penetration tests more cost-effective by eliminating potential "cheap shots" that pentesters love to take. They will also, of course, walk away
with the ability to become the domain admin of an average corporation from their couch in record time



Kimber Spradlin
Chief Marketing Officer

Kimber brings over 20 years of experience guiding established and start-up companies to market leadership through integrated marketing
strategies. She is an expert in the high-level and tactical aspects of successful technology marketing and she works to maintain a highly
collaborative environment, and her hands-on approach drives innovative thinking into all aspects of successful marketing.

Session -

Join us as we kickoff Graylog GO with a few words from Kimber Spradlin and CEO Andy Grolnick as well as a preview of things to come from
CTO and Founder Lennart Koopmann, then roll right into our keynote speaker Johnny Xmas.



Lennart Koopmann
Founder/CTO

Lennart founded Graylog as an Open Source project in 2009 to meet the needs of application developers, DevOps, and IT Ops teams. Since
that time, he has led the transformation of Graylog into a robust enterprise application and established the company’s product and technolo-
gy platform as one of the leading centralized log management solutions.

Session - Welcome and Keynote

Join us as we kickoff Graylog GO with a few words from CEO Andy Grolnick and a preview of things to come from CTO and Founder Lennart
Koopmann, then roll right into our keynote speaker Johnny Xmas.

Session 2 - To Infinity And Beyond: The Future of Graylog

Where do we go from here? We have big dreams and we want to share them with you and hear what you want to see from Graylog the next
time we all get together.



Mark Brooks
VP Customer Solutions

Senior-Level Sales Management Professional with a consistent, top-ranking record of achievement for both personal and team-based
business objectives with a talent for recruiting, hiring, training, motivating, mentoring, and providing strong leadership to sales teams.

Session - Gaining Insight Into Your Graylog Instance

Insider secrets from the Customer Support team on what configuration and performance metrics you should be monitoring. Includes a quick
demo of the new health module dashboards and Open Insights.



Nick Carstensen
Product Manager- Security/ Integrations

Nick has been in the security industry for over fifteen years with experience in product management, sales, and marketing. Nick is currently
a Product Manager for Graylog focusing on Security and Integrations. Nick developed his broad security background as a security engineer
for several companies ranging from Anheuser-Busch to Scottrade. His areas of expertise include logging/SEIM solutions, host-based securi-
ty, firewalls, network design/restructuring, and scripting. In his free time, Nick enjoys being with his kids, riding his bike, and playing with
new technologies.

Session - Your Security Team

Shhhh . . . we'll be showing off some brand new stuff from the Graylog Security team. Be the first to see new capabilities while learning how
Graylog can be used for Security Information and Event Management.

Session 2- Where you should shove your data and why

Src_user? User? username? uname? Better try them all! Or . . . you can join Product Manager Nick Carstensen to understand where your
data is supposed to be at, why it is there, and how it got there. Nick will be discussing Graylog’s Illuminate functionality, parsing best prac-
tices, the Graylog Information Model, and the normalization of logs.



Simon Huber
Solutions Sales Engineer

A solution design and implementation consultant with over 8 years of experience working with software vendors, enterprises, and network-
ing consultancies in the delivery of large, complex, enterprise monitoring solutions.

Session - The Line Between Threat Hunting and Threat Detection

Real-world example from threat hunter and Graylog trainer, Adam "Abe" Abernethy who will provide expertise on building a successful
security strategy, supported by a balance between threat detection and threat hunting with specific techniques for each.



Tyler Williams

Principal Senior Cybersecurity Data Scientist |
Data Science/ Machine Learning Solutions, SAIC Data

Data Scientist with experience in Security, Insider Threat, and Fraud looking to apply Statistical Risk Modeling and detection techniques to
the toughest problems in Security, Safety, and Trust.

Session - Detection Anomalies with Graylog

Wishing you could have a Data Scientist on staff? What if Graylog came with one built-in for uncovering unusual user and endpoint behavior
indicating things like insider threats, data exfiltration, privileged movement, or flight risk?

Thank you


Click to View FlipBook Version