35% Off Finance Skills That Get You Hired - Code CFI35
Master AI & Data—50% Off Udacity (Code CC50)
Overview
Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore data-driven detection engineering techniques in this 30-minute conference talk that demonstrates how to efficiently identify malicious activity within vast amounts of security data and transform it into actionable threat intelligence. Learn a data-first methodology for building effective detection rules and threat feeds to catch command and control (C2) communications. Discover practical approaches to sifting through large datasets to uncover indicators of compromise (IOCs) and develop systematic methods for threat hunting. Gain insights into modern detection engineering practices that prioritize data analysis over traditional signature-based approaches, enabling more effective identification of sophisticated threats hiding in network traffic and security logs.
Syllabus
BSidesSF 2025 - Trawling for IOCs: Catching C2 in a Sea of Data (Moses Schwartz)
Taught by
Security BSides San Francisco