Location: Bits & Pieces Room of Sansom Place West
Implementing SSH & HECTOR Security Intelligence
This month's Security SIG will have two presentations.
Implementing SSH Effectively - How can you be sure that the server you're logging into is the server you think you're logging into? This and other implementation details such as client and server configuration, limiting SSH, and testing and debugging will be discussed.
Clay Wells is a Senior Systems Administrator for the Center for Clinical Biostatistics at the Perelman School of Medicine.
HECTOR, SAS Security Intelligence Platform Overview - HECTOR is a completely open source security intelligence platform built by SAS information security to digest, analyze, and monitor security information diverse security information from incident reports to port scans to honeypot activity any more. HECTOR applies big data analytics to security information to create true security intelligence that can help you make smart, metrics and data driven security decisions. HECTOR is freely available on Github but an overview will give you a better sense of whether or not HECTOR is right for your organization.
Justin C. Klein Keane, MA MCIT is an IT Sr Project Leader in Information Security at Penn's School of Arts & Sciences
Sponsored by Security SIG