An introduction to Network Security Monitoring (NSM) (and how to do it yourself)

Published: 01 January 1970
on channel: Hasgeek TV
929
12

One of the methods to identify, process and gain visibility into a network is Network Security Monitoring(NSM). This talk will outline ample reasons for implementing NSM in a network and the various ways to do it.

For more conversations on network security, and security in general, follow hasgeek.com/rootconf

Timestamp
00:00 Speaker Introduction
00:36 Understanding Attack Dwell Time
01:25 Why is 'Attacker Dwell Time' important?
02:14 Understanding Security 1% Idea
02:47 The Sony Hack
03:39 The Microsoft Hack
04:22 The approach towards Security
05:12 What is Network Security Monitoring(NSM)?
06:04 Hardware Components required for NSM
07:01 Software set up for NSM
07:20 What is Zeek?
07:56 What is Suricata?
08:13 What is Security Onion?
08:31 Flat Network Architecture for NSM
09:08 Demo
22:44 Alternatives to no SPAN/TAP
23:45 Resources
23:55 Speaker's contact details
24:02 QnA


Watch video An introduction to Network Security Monitoring (NSM) (and how to do it yourself) online without registration, duration hours minute second in high quality. This video was added by user Hasgeek TV 01 January 1970, don't forget to share it with your friends and acquaintances, it has been viewed on our site 929 once and liked it 12 people.