August 21, 2014Time: 2:00pm - 3:30pm
Location: Bits & Pieces Room of Sansom Place West

Implementing SSH & HECTOR Security Intelligence

This month's Security SIG will have two presentations.

Implementing SSH Effectively - How can you be sure that the server you're logging into is the server you think you're logging into? This and other implementation details such as client and server configuration, limiting SSH, and testing and debugging will be discussed.

Clay Wells is a Senior Systems Administrator for the Center for Clinical Biostatistics at the Perelman School of Medicine.

HECTOR, SAS Security Intelligence Platform Overview - HECTOR is a completely open source security intelligence platform built by SAS information security to digest, analyze, and monitor security information diverse security information from incident reports to port scans to honeypot activity any more. HECTOR applies big data analytics to security information to create true security intelligence that can help you make smart, metrics and data driven security decisions. HECTOR is freely available on Github but an overview will give you a better sense of whether or not HECTOR is right for your organization.

Justin C. Klein Keane, MA MCIT is an IT Sr Project Leader in Information Security at Penn's School of Arts & Sciences

Relevant links

HECTOR: https://github.com/madirish/hector

iCalendar: http://www.upenn.edu/computing/group/sigcal/ImplementingAugust21.ics

Sponsored by Security SIG

Print This Page Share: