Home
Talks
CFP Guide
What is BSides?
About
Contact
Light
← All talks
Tool
BSides talks featuring Logstash
36
talks mention this tool across
18
BSides chapters.
Talks featuring Logstash
35:44
Sweet Security: Deploying a Defensive Raspberry Pi
Travis Smith
BSidesSF
· 2016
Technical
Demo
Open →
2016-04
46:44
Discover Analytic Gaps with Unfetter
Matt Davis
Shaun McCullough
BSides DC
· 2017
Technical
Blue
Talk
Open →
2017-10
42:44
Threat Hunting On Linux And Mac With Auditbeat System Module
Aaron Jewitt
BSides Luxembourg
· 2019
Technical
DFIR
Detection Engineering
Blue
Talk
Open →
2019-11
47:42
Threat Hunting with RockNSM
Bradford Dabbs
BSides KC
· 2018
Technical
Blue
Talk
Open →
2018-06
19:40
BSides Rochester 2018 - IoT Botnet Detection System using Machine Learning
BSidesROC
Open →
2018-04
24:25
BSidesMCR 2018: Adventures In WAF by Michael Thompson
BSides Manchester
Open →
2018-08
23:19
Pwning all the Internet of things for fun and profit
Ben Hughes
BSides Toronto
· 2014
Technical
Talk
Open →
2014-12
25:06
Automation Plumbing - Ashley Holtz & Kyle Maxwell
BSides Las Vegas
Open →
2016-08
24:41
Got popcorn? What's on the Vuln Channel tonight?
Rob Jerdonek
Lily Chau
BSidesSF
· 2022
Technical
Talk
Open →
2022-07
35:42
Connecting the Dots: Building a Data-Dump Search Engine
Arron Finnon
BSides London
Technical
Talk
Open →
2017-06
20:06
ELK: Not P.O.S.
Jason Kendall
BSides Toronto
· 2014
Technical
Talk
Open →
2014-12
50:37
Terry D . Smith II - Threat Hunting and Hacking Questions which Get Increasingly Harder
Terry D. Smith II
BSides Augusta
Technical
Blue
Talk
Open →
2023-10
54:37
When a Security Architect Writes an Application
David Zendzian
BSides Charleston
· 2014
Technical
Web AppSec
Talk
Open →
2014-11
25:14
Securing Fast and Furious DevOps Pipelines
Abdessamad Temmar
BSides Las Vegas
· 2019
Technical
DevSecOps
Supply Chain Security
Blue
Talk
Open →
2019-10
32:36
Unified Protection with The Elastic Stack
James Spiteri
BSides Athens
· 2020
Technical
Blue
Talk
Open →
2020-06
19:25
Paravirtualized Honeypot Deployment for the Analysis of Malicious Activity
Andronikos Kyriakou
BSides Athens
· 2018
Technical
Malware Analysis
Threat Intel
Blue
Talk
Open →
2018-08
28:51
Immunizing vulnerable web applications with AppArmor
György Demarcsek
BSides Luxembourg
· 2017
Technical
Web AppSec
Talk
Open →
2017-10
31:20
Getting Better with Data - Steph Locke
Steph Locke
BSides London
· 2016
Technical
Talk
Open →
2016-07
44:07
Build Yourself an Elastic Threat Hunting and Monitoring SIEM
Ronnie Watson
BSides Huntsville
· 2021
Technical
Talk
Open →
2021-02
19:24
NoSQL Means No Security?
Philipp Krenn
BSides Athens
· 2020
Technical
Demo
Talk
Open →
2020-06
33:09
Fe-fi-fo-FIM, I Smell The Monitoring Of An Elastic Stack!
Brett Calderbank
BSides Manchester
· 2019
Technical
Detection Engineering
GRC
Talk
Open →
2019-09
32:20
Secure(r) Cloud Development
Christo Goosen
Toufeeq Ockards
BSides Cape Town
· 2017
Technical
Cloud IAM
Detection Engineering
DevSecOps
Talk
Open →
2017-12
25:13
Josh Bower - Enriching Osquery with Actionable Context
BSides Augusta
Open →
2019-10
31:24
BSidesSF 2025 - Resilience in the Uncharted AI Landscape (Ranita Bhattacharyya)
Ranita Bhattacharyya
BSidesSF
· 2025
Talk
Open →
2025-06
54:48
A pain in the SaaS: Scalable Detection in the Age of Data Sprawl
Alan Braithwaite
BSides Seattle
Technical
Talk
Open →
2025-06
19:01
Building a Security Audit Logging System on a Shoestring Budget
George Wang
BSides Las Vegas
Technical
Detection Engineering
DevSecOps
Talk
Open →
2024-09
51:54
Wes Lambert - Augmenting the (Security) Onion: Facilitating Enhanced Detection and Response
Wes Lambert
BSides Augusta
Technical
DFIR
Detection Engineering
Threat Intel
Blue
Talk
Open →
2019-10
56:23
Blue teaming Incident Response for the Win
Roy Wattanasin
Bsides CT
· 2019
Technical
Blue
Talk
Open →
2019-11
22:22
PG - Catching Linux Post-Exploitation with Auditd - Eric Gershman
BSides Las Vegas
Open →
2016-12
22:49
GT - Exploration of Novel Visualizations for Information Security Data - Roni Choudhury & Brian Wyli
BSides Las Vegas
Open →
2017-08
22:57
Log Management and Log Aggregation
Gared Seats
BSides KC
· 2017
Technical
Talk
Open →
2017-07
28:34
Michael Banks - You TOO can defend against MILLIONS of cyber attacks
BSides Augusta
Open →
2016-09
25:03
Forensics: We're Not Just Byte-Sized
Ben Hodson
BSides Basingstoke
· 2025
Technical
Talk
Open →
2025-09
52:44
The Contemplator Approach: A Tale of Data Enrichment
Rodrigo Brenes
Pedro Rodriguez
BSides Las Vegas
· 2019
Technical
Talk
Open →
2019-10
32:29
Cleaning the Apple Orchard: Using Venator to Detect macOS Compromise
Richie Cyrus
BSides Charm
· 2019
Technical
DFIR
Malware Analysis
Threat Intel
Intermediary
Blue
Case Studies and Incidents Analysis
Technical Deep-dives
+2
Open →
2021-05
25:39
Current State of Virtualizing Network Monitoring
Ed Sealing
Daniel Lohin
BSides Charm
· 2017
Technical
Detection Engineering
Network Security
Case Studies and Incidents Analysis
Technical Deep-dives
Talk
Open →
2021-05