Applied Detection and Analysis with Flow Data - SO Con 2014
Applied Detection and Analysis Using Flow Data - MIRCon 2014
Developing Analytic Technique and Defeating Cognitive Bias in Security
Using Canary Honeypots for Network Security Monitoring
CISSA Lightning Talk - Building a Malware Analysis Lab on a Budget
Art into Science 2017 - Investigation Theory: A Cognitive Approach
BSA2016 - Honeypots for Network Security Monitoring
SOC2016 - The Investigation Labyrinth
Abstract Tools for Effective Threat Hunting
BSides Augusta 2015 - Building a Better Analyst Using Cognitive Psychology
Minding the Metacognitive Gap - BSides NOLA
Hacking Food - BSides Augusta 2017