Skip to content

Passionate aboutsecurity

  • Twitter
  • LinkedIn
  • Home
  • Posts
  • Projects
  • Papers & Presentations
  • SANS upcoming courses
  • About
  • Home
  • Posts
  • Projects
  • Papers & Presentations
  • SANS upcoming courses
  • About

Awareness, Blue Team, General, How To Start In Security, Incident Response, Links, Network Security Monitoring, Pentesting, SANS, Security Operations, Threat Hunting

Do you want to learn how to ‘Blue Team’​? Start with “Time Based Security”​.

Also available on LinkedIn “We’ve been looking at security the wrong way […] Fortress Mentality insists that building tall electronic walls is how to keep […]

General, How To Start In Security, Papers & Presentations, Training

En Málaga o en Nueva York: Cómo ‘hackear’ tu carrera en ciberseguridad (Spanish)

En esta sesión compartiré recomendaciones y experiencias útiles, tanto para aquellos que quieren desarrollar su carrera en ciberseguridad, como aquellos que quieren impulsarla y desarrollar todo su potencial.

Incident Response, Papers & Presentations, Security Operations, Threat Hunting, Threat Intelligence, Tools

Getting SecOps Foundations Right with Techniques, Tactics, and Procedures Zero (TTP0)

TTP0 is a new community project created by SecOps (Security Operations) practitioners for SecOps practitioners

Papers & Presentations, SANS, Security Operations, Threat Intelligence

Intelligence Driven Defense: Successfully Embedding Cyber Threat Intel in Security Operations

Being able to tell a compelling story that can answer key questions like: who is attacking us, what is their motivation, were they here before, how do they operate, what is the impact to our business, and will they come back, should be one of the ultimate goals of any effective blue team. However, being successful at embedding cyber threat intel in SecOps require something else: maintaining a solid understanding of the environment we are defending, as well as a systematic way to identify and prioritize applicable threats and assess impact, so we can respond appropriately to these attacks.

BlackHat, rastrea2r, Security Operations, Threat Intelligence, Tools

Speaking at BlackHat USA 2018

What is best that speaking at BlackHat USA? Doing it twice! I’m excited to announce that I’ll be speaking at BH USA for the 3rd […]

Network Security Monitoring, Threat Hunting

Disrupting the Disruptors: How to Threat Hunt Like a Pro

Read my article on how to threat hunt like a pro on Recorded Future’s blog: https://www.recordedfuture.com/cyber-threat-hunting/ Here’s an excerpt of this article: As the saying […]

Interview

Interview: Enterprise Security Weekly #70

Thanks to Paul Asadoorian, Doug White and Matt Alderman for having me on Enterprise Security Weekly, episode 70. Enjoy the show! https://wiki.securityweekly.com/ES_Episode70  

Continuous Monitoring, Network Security Monitoring, Threat Hunting

My contribution to the “CDM From The Frontlines” ebook

Thanks to @TenableSecurity for asking me to contribute to their new ebook on Continuous Diagnostics & Mitigation: https://www.tenable.com/whitepapers/cdm-from-the-frontlines

Machine Learning

Machine Learning: Practical Applications for Cyber Security

Each day, exponentially more data and computing power becomes available. We’re able to task machines to learn and understand more than ever before and, when combined with human analysis, this process can dramatically reduce laborious tasks. However, even with this surge in applicability, machine learning is still often considered a technology of the future.

Interview, Threat Hunting

On Cyber Security Interviews with Douglas Brush

https://cybersecurityinterviews.com/009-ismael-valenzuela-lets-see-happens/

Threat Hunting

Presenting rastrea2r at SANS Threat Hunting Summit 2016

Watch my presentation at the SANS Threat Hunting Summit 2016 in New Orleans. https://www.youtube.com/watch?v=0PvBsL6KKfA&feature=youtu.be&a “In this session, SANS instructor Ismael Valenzuela will explain the methods […]

Copyright © 2008-2018 Ismael Valenzuela. All rights reserved.