Publications and Conferences

This is a non-exhaustive list of blogs, articles, conferences hosted, and other publications I've created or co-created.

card-img
(Re)building Threat Detection and Incident Response at LinkedIn

This blog discusses how LinkedIn rebuilt its security operations platform and teams, scaled to protect nearly 20,000 employees and more than 875 million members, and our approach and strategy to achieve this objective. In subsequent posts, we will do a deep dive into how we built and scaled threat detection, improved asset visibility, and enhanced our ability to respond to incidents within minutes, with many lessons learned along the way.

 Link
card-img
Crafting the Infosec Playbook

Co-authored this O'Reilly book on building an incident response program and creating the process, philosophy, and architecture for implementing an information security monitoring program. The book was also translated into Japanese.

 Link
card-img
Disk Image Deception

While working with Cisco's CSIRT, I co-authored a blog post highlighting our encounter with a malspam campaign that misused the .IMG file extension. Following this, our team developed specific incident response rules. One rule identified malicious disk image files in user inboxes, which had a minimal false-positive rate. Another tracked unusual activities tied to the registry assembly executable, a target for the Nanocore malware. We also emphasized monitoring uncommon command executions. Our experience taught us three main lessons: the limitation of auto-mitigation tools, the challenges of implementing simple solutions like blocking extensions in diverse enterprises, and the significance of understanding attacker behavior (TTPs) over solely focusing on known threat indicators.

 Link
card-img
The Right Data at the Right Time

Presented at the SANS SIEM Summit on defining the right observability for security monitoring and how to apply the data collection principles to delivering security monitoring.

 Link
card-img
Cognitive Bias in Incident Response

In the blog 'Cognitive Bias in Incident Response', I illustrate into the pitfalls of overconfidence in cybersecurity incident response, highlighting the Dunning–Kruger (DK) effect. This cognitive bias leads some less-experienced analysts to mistakenly believe they possess superior skills. Drawing from the words of Charles Darwin and supported by the findings of Dunning and Kruger's studies, I illustrate how this misplaced confidence can manifest in the realm of IT security. Through a real-world scenario, the dangers of the DK effect become apparent, revealing that a premature assurance can lead to incomplete threat analysis and responses. The article emphasizes the importance of standardized methodologies, comprehensive documentation, and continuous training to combat these biases.

 Link
card-img
CSIRT Schiltron: Training, Techniques, and Talent

Developed and delivered this presentation on enabling readiness and improving capabilities with evolving threat profiles that require new approaches and new skillsets for incident reponse teams.

 Link
card-img
How Computer Incident Response teams use Cyber Threat Intelligence (CTI) to keep up with the miscreants

Developed and delivered this presentation at LACNIC 29 in Panama on the topics of cyber threat intelligence and how to apply lessons to responding to incidents and enhancing security monitoring playbooks to detect threat actors based on known tactics, techniques, and procedures.

 Link
card-img
Incident Detection and Response

Developed and delivered this presentation at InterOp Japan on building a world class security team and demonstrating our approaches with web filtering and intrusion detection.

 Link
card-img
Ad-Weary Or, “What Could Possibly Go Wrong?”

Developed and delivered this presentation at both Security B-Sides Asheville and LACNIC/LACNOG 26 in Costa Rica on the threat of Ad-ware in enterprise networks and some of the more problematic issues I worked on while security monitoring and responding to threats. This presentation shows some of the tactics used and some of the research involved in preventing data loss and other damange from malicious or problematic advertising software.

 Link
card-img
FIRST Technical Colloquium Amsterdam

Presented at, and have organized and hosted for 10 years the annual FIRST Technical Colloquium in Amsterdam, Netherlands where in the decade of conference proceedings and trainings has produced hundreds of topical talks and presentations on threat actors, incident handling and management, threat research, malware analysis, threat intelligence, and many other varied information security related topics. The FIRST TC in Amsterdam is the longest running, free security conference in the world.

 Link
card-img
The State of Web Security: Attack and Response

Developed and delivered this presentation at several Cisco Live events in both the United States and Australia. This in-depth presentation covered the state of the art for web based attacks at the time, include drive-by downloads and watering hole attacks. The presentation detailed how to protect enterprises from such threats through HTTP/S inspection and creative web-based logging and monitoring. The Australia presentation earned a Distinguished Speaker Award for positive audience feedback.

 Link
card-img
Cloud Security Observability for Detection and Response

Discussed enterprise scale security observability for incident response and threat detection, and how to approach customizing on each organization's unique requirements on the Google Cloud Security Podcast

 Link