by Nathan Stacey
Hosted by Nathan Stacey. This page features videos from a bunch of Elasticsearch experts talking Elasticsearch and all of the IT tech surrounding it. If you like the videos on this page, like the page and help us promote the content! #elastic #elasticsearch #kibana #elk
Language
🇺🇲
Publishing Since
6/5/2024
Email Addresses
1 available
Phone Numbers
0 available
August 23, 2024
<p>Heidi has seen many Security Operations Centers (SOC) over her career. She has seen many SIEM tools and many SOC cultures. She describes why she chose Elastic and sees the future in Elastic. </p> <p>Nathan Stacey and Heidi discuss the evolution of security operations centers (SOCs) and the role of Elastic in modernizing the SOC. They talk about the transition from network operations centers (NOCs) to SOCs and the importance of integrating security and network teams. They also highlight the value of bringing in large quantities of data and the role of AI in analyzing and correlating that data. They discuss the Elastic Common Schema and its impact on data normalization and correlation. Overall, they emphasize the open and agile nature of Elastic in meeting the evolving needs of SOCs.</p> <p>Takeaways:</p> <p>-SOCs have evolved from network operations centers (NOCs) and now require the integration of security and network teams.</p> <p>-Bringing in large quantities of data and leveraging AI can provide a more comprehensive and holistic view of security incidents.</p> <p>-The Elastic Common Schema enables data normalization and correlation across different log sources.</p> <p>-Elastic's open and agile approach allows for customer-driven development and the ability to meet the evolving needs of SOCs.</p> <p>Sound Bites:</p> <p>"SOCs are transitioning and moving towards the new, and Elastic is part of that new."</p> <p>"The goal is to bring in all the data to have a full picture and enable effective security operations."</p> <p>"Elastic allows for a more efficient and effective SOC by providing an event rendered view and leveraging AI for analysis."</p> <p>00:00 Heidi Gerken's Background in Security Operations Centers</p> <p>03:00 The Transition from NOCs to SOCs</p> <p>07:02 Challenges of Managing Large Data Sets in SOCs</p> <p>13:07 The Role of AI and Machine Learning in SOC Efficiency</p> <p>28:03 The Importance of Elastic Common Schema in SOC Operations</p>
August 6, 2024
<p>Paul Vout discusses his experience participating in a SatCom cyber exercise focused on satellite-based cyber threats and techniques. The exercise aimed to simulate attacks on a real satellite called Moonlighter, with a focus on directional control and energy consumption. Paul highlights the importance of precise coordination of cameras and solar panels on satellites and the potential vulnerabilities in these areas. He also emphasizes the need for a structured process and framework in OT cyber exercises to guide analysts and improve training. Overall, the exercise provided valuable insights into securing satellite systems and can inform the cybersecurity practices in other OT domains.</p> <p>Watch the full video here:Youtube: <a href="https://youtu.be/hEAusX3nkHI">https://youtu.be/hEAusX3nkHI</a></p> <p>Keywords</p> <p>SatCom, cyber exercise, satellite, directional control, energy consumption, OT cyber, supply chain, process, framework, training, elastic, elasticsearch, red team, blue team</p> <p>Takeaways</p> <p>SatCom cyber exercises provide valuable insights into securing satellite systems and can inform cybersecurity practices in other OT domains.</p> <p>The directional control and energy consumption of satellites are critical areas to focus on in SatCom cyber exercises.</p> <p>A structured process and framework are essential in OT cyber exercises to guide analysts and improve training.</p> <p>Understanding the supply chain and the specific components of satellite systems is crucial for effective cybersecurity.</p> <p>Elastic's ability to ingest and interpret multiple sources of data makes it a valuable tool in SatCom cyber exercises.</p> <p>Sound Bites</p> <p>"Directional control of a satellite is extremely important, as is the manipulation of power generation and consumption."</p> <p>"Satellite cybersecurity requires a focus on specific satellite components and understanding the supply chain."</p> <p>"A structured process and framework in OT cyber exercises can improve training and guide analysts."</p> <p>Chapters</p> <p>00:00 Introduction to the SatCom Cyber Exercise</p> <p>03:49 The Importance of Directional Control and Energy Consumption</p> <p>10:21 The Value of Focusing on SatCom Cybersecurity</p> <p>18:22 Lessons Learned and Best Practices for OT Cyber Exercises</p> <p>26:22 The Role of Elastic in Analyzing Satellite Telemetry Data</p>
August 6, 2024
<ul> <li> <li>Nathan Stacey interviews Michael Young about sizing in Elastic. They discuss the concept of distributed systems, the value of data tiering, and the challenges of split brain scenarios. They also touch on the different tiers in Elastic (hot, warm, cold, and frozen) and how they impact performance and cost. </li> </li> </ul> <li> <li>The conversation provides insights into the importance of understanding the resources and requirements of an Elastic cluster to optimize its performance.Where to see this video:</li> <p><br></p> <p><br></p> <p>Youtube of this full video as well as the channel with the rest of our videos<a href="https://youtu.be/ND0mn6Xsu3E">https://youtu.be/ND0mn6Xsu3E<br></a></p> </li> <p>Keywords</p> <ul> <li><p>Elastic, sizing, distributed systems, data tiering, split brain, hot tier, warm tier, cold tier, frozen tier, performance, cost optimization, elasticsearch, tuning</p> </li> </ul> <p><br></p> <p>Takeaways</p> <ul> <li><p>Understanding the resources and requirements of an Elastic cluster is crucial for optimizing its performance.</p> </li> <li><p>Data tiering in Elastic allows for the efficient management of data based on its value and performance needs.</p> </li> <li><p>Split brain scenarios can occur in distributed systems and can lead to conflicts and inconsistencies in data.</p> </li> <li><p>Elastic offers different tiers (hot, warm, cold, and frozen) to accommodate different performance and cost requirements.</p> </li> <li><p>Proper sizing and configuration of an Elastic cluster can ensure efficient data management and high performance.</p> </li> </ul> <p><br></p> <p>Quotes</p> <ul> <li><p>"Enabling people to think about the things that matter with sizing so they could be more informed."</p> </li> <li><p>"A few tweaks here and there changes that cluster from ho-hum to crazy fast."</p> </li> <li><p>"Elastic can actually get down to single-digit millisecond response times."</p> </li> </ul> <p><strong>Chapters</strong></p> <p>00:00 Introduction and Background</p> <p>02:18 The Importance of Sizing</p> <p>08:57 Overview of the Series</p> <p>11:38 Data Tiering in Elastic</p> <p>31:42 Understanding Split Brain Scenarios</p>
Pod Engine is not affiliated with, endorsed by, or officially connected with any of the podcasts displayed on this platform. We operate independently as a podcast discovery and analytics service.
All podcast artwork, thumbnails, and content displayed on this page are the property of their respective owners and are protected by applicable copyright laws. This includes, but is not limited to, podcast cover art, episode artwork, show descriptions, episode titles, transcripts, audio snippets, and any other content originating from the podcast creators or their licensors.
We display this content under fair use principles and/or implied license for the purpose of podcast discovery, information, and commentary. We make no claim of ownership over any podcast content, artwork, or related materials shown on this platform. All trademarks, service marks, and trade names are the property of their respective owners.
While we strive to ensure all content usage is properly authorized, if you are a rights holder and believe your content is being used inappropriately or without proper authorization, please contact us immediately at [email protected] for prompt review and appropriate action, which may include content removal or proper attribution.
By accessing and using this platform, you acknowledge and agree to respect all applicable copyright laws and intellectual property rights of content owners. Any unauthorized reproduction, distribution, or commercial use of the content displayed on this platform is strictly prohibited.