There are only three weeks left to enter the Rule Your Network to win up to $18,000 USD. Submit an entry by August 31st and you’ll be eligible to win our cash prizes.
How to Enter
To start, download Network Monitor Freemium and create unique DPA rules, query rules, or dashboards to submit to one of the following three categories:
Novel Threat Detection: Can you use Network Monitor to isolate and validate malicious network traffic? Take a look at our recent PowerShell Tunneling Through ICMP blog for an example. Detection that targets attacks such as WannaCry, NotPetya, Gh0st, or BBSR, are all fair game for entries as long as you innovate with Network Monitor!
Best Security Hunting Dashboard or Use Case: Create a great security hunting scenario with NetMon. It could be rich with true positives and have a low amount of noise. Make a dashboard, support it with a DPA rule, and you could create a $5,000 winning entry!
Best IT Operations Use Case: Identify IT operational issues using NetMon! Suppose someone has misconfigured a switch, the VOIP traffic is really noisy, or your home IoT sprinkler system is going crazy trying to reach Google’s DNS. The difference between a security problem and an IT problem is often found in the intent of the creator. Sometimes simple misconfiguration issues can generate denial of service, wasted bandwidth, or loss of functionality.
Need More Help?
On Wednesday August 11th, LogRhythm will be hosting an “Ask the Experts” session. Talk to the NetMon development team to get ideas, learn DPA coding techniques, and play with dashboards. You’ll get the help you need to submit a winning entry to the Rule Your Network challenge!
Fri, Aug 11, 2017 10:00 AM–11:00 AM MDT
Please join my meeting from your computer, tablet or smartphone. https://global.gotomeeting.com/join/620170613
This meeting is locked with a password: freemium
You can also dial in using your phone: United States +1 (312) 757-3136
Access Code: 620-170-613
More phone numbers: United Kingdom +44 330 221 0088
First time using GoToMeeting?
More Posts from Rob McGovern
- The Top 8 Things to Analyze in Your Network to Detect a Compromised System
- Using NetMon to Detect WannaCry Initial Exploit Traffic
- Analyzing ICMP Traffic with Network Monitor