Explore a comprehensive conference talk that delves into data collection and protection strategies across various domains. Learn about network and machine data, Windows logs, graph theory, and air gap popping techniques. Discover insights on hardware supply chain interdiction, endpoint analysis, asset detection, and network sigma. Gain knowledge about OS query, application data utilization, protocol metadata, and the role of J3 and Salesforce in data management. Understand the analyst's perspective, intelligence operations workflow, and the concept of Protoss. Examine outliers and J3 ER to round out your understanding of modern data collection and protection methodologies.
Overview
Syllabus
Intro
Pluralsight
Presentation Overview
Network
Machine Data
Windows Logs
Graph Theory
AirGap Popping
Hardware Supply Chain Interdiction
Endpoint Analysis
Asset Detection
Network Sigma
OS Query
Application Data
As Your Sentinel
Protocol Metadata
J3 and Salesforce
The Analyst
Intelligence
Operations Workflow
Protoss
Outliers
J3 ER