• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • About
    • Secure360
    • UMSA
    • Get Involved
  • Events
    • Secure360 2021
    • Student360
    • Past Events
      • 2020 Secure360 Twin Cities
      • 2020 Student360
      • 2019 Secure360 Twin Cities
      • 2019 Student360
      • 2018 Secure360 Twin Cities
      • 2018 Secure360 Wisconsin
      • 2018 Student360
      • 2017 Secure360 Twin Cities
      • 2017 Student360
      • 2016 TC Secure360 Conference
      • 2015 Secure360 Conference
      • 2014 Secure360 Conference
      • 2013 Secure360 Conference
        • 2013 Secure360 Conference Speaker Presentations
      • 2012 Secure360 Conference
  • For Sponsors
    • Secure360 Twin Cities
    • Student360 Sponsors
  • For Speakers
    • Secure360 Speaker Details
    • Student360 Speaker Details
  • Blog
  • Nav Social Menu

    • Facebook
    • LinkedIn
    • Twitter
    • Vimeo

Secure360

Monitoring Intrusions with Honeypots and Nagios

There’s a whole lot more to a network today than just ingress and egress filtering, antivirus, and monitoring. With mobile devices, VPN, and BYOD, to just name a few, traditional attack vectors are going out the window. Why wait for malware and attacks to spread, and the helpdesk to be flooded with support requests, when you can identify and stop them while they are still in the early phases.

We’re going to discuss a realistic approach to adding open source honeypots to your networks and existing security processes. Honeypots help fill the interior holes left by simple border firewalls and intrusion detection systems. Knowing how to monitor them and identify key information, is vital to proper usage. Some items they can help detect are:
– Attacks, before a foothold is gained.
– Malware, while attempting to spread.
– The quality of security audit teams and their ability to properly identify systems.

Key learning points:
  • Using honeypots to identify attacks against your network.
  • Catch malware as it enters and scans your network.
  • Attack vectors are changing, keep ahead of the curve!

About Spenser Reinhardt

Spenser is a member of the Technical Support Team at Nagios Enterprises, along with maintaining and developing for the Nagios Plugins project among other open source projects. His past experiences in both large and small organizations, positions ranging from desktop technical support to CSIRT member and beyond, provide both a wide and deep understanding of technology principals and impact on businesses. He also maintains and manages specialty software and incidents for high security clients at Nagios.

In the off hours, he volunteers time to do technical presentations and classes with local security groups, such as Def Con 612 and OWASP MSP. When not teaching and helping others, he regularly participates in security capture the flag events, like Def Con CTF or CSAW, with the team Shellphish. You’ll also find him running capture the flag events for local groups and conferences in the Minnesota area, under the organization 40byteCTF.

Primary Sidebar

Details

Tuesday May 12, 2015
3:00 PM - 4:00 PM
Room 10
Level: Intermediate
Focus: Cybersecurity,

Share this page

Share on Facebook
Facebook
Tweet about this on Twitter
Twitter
Share on LinkedIn
Linkedin
Buffer this page
Buffer
Email this to someone
email

Footer

Contact

For more information about UMSA events, contact: Marie Strawser

Email List Signup

Join our email list for monthly Secure360 news and updates!




Join our tradeshow email list for updates on sponsorship opportunities and upcoming exhibitor deadlines.

Sponsored by:
© 2021 Secure360. All rights reserved.