{"id":23830,"date":"2024-01-30T14:01:09","date_gmt":"2024-01-30T22:01:09","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/01\/30\/news-17560\/"},"modified":"2024-01-30T14:01:09","modified_gmt":"2024-01-30T22:01:09","slug":"news-17560","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/01\/30\/news-17560\/","title":{"rendered":"Join us at InfoSec Jupyterthon 2024"},"content":{"rendered":"<p><strong>Credit to Author: Microsoft Threat Intelligence| Date: Mon, 29 Jan 2024 18:00:00 +0000<\/strong><\/p>\n<p>Jupyter notebooks are continuing to grow in popularity in information security as an alternative or supplement to mainstream security operations center (SOC) tools. Notebooks can be used interactively for threat detection and response, or as automated tasks in a larger pipeline. Their flexibility and ability to combine code, data analysis, and visualization in a single, easily shareable document makes them compelling tools with almost unlimited applications and possibilities.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/01\/Figure-1-infosec-jupyterthon-event-image.webp\" alt=\"A graphic with dark blue background and the text InfoSec Jupyterthon in white font in the middle.\" class=\"wp-image-133165 webp-format\" srcset=\"\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/01\/Figure-1-infosec-jupyterthon-event-image.webp\"><figcaption class=\"wp-element-caption\"><em>Figure 1. InfoSec Jupyterthon 2024 event image<\/em><\/figcaption><\/figure>\n<p>We\u2019re inviting the community of analysts and engineers to join us at InfoSec Jupyterthon 2024. This online event, to be held on February 15-16, 2024, serves as an opportunity for infosec analysts and engineers to meet and engage with security practitioners using notebooks in their daily work. It is organized by our friends at Open Threat Research, together with folks from the Microsoft Threat Intelligence community.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/01\/Figure-2-screen-capture-of-previous-Jupyterthon-event.webp\" alt=\"A screen capture of a video conference fro\" class=\"wp-image-133166 webp-format\" srcset=\"\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/01\/Figure-2-screen-capture-of-previous-Jupyterthon-event.webp\"><figcaption class=\"wp-element-caption\"><em>Figure 2. Screen capture from our previous Jupyterthon event<\/em><\/figcaption><\/figure>\n<p>Some of the topics to be covered in this year\u2019s talks include:<\/p>\n<ul>\n<li>Analyzing Active Directory with Bloodhound CE, Jupyter, and Python<\/li>\n<li>Graphing ransomware &amp; data leak sites trends with Plotly<\/li>\n<li>Threat hunting in three dimensions<\/li>\n<li>Guardians of Identity: OKTA&#8217;s underworld<\/li>\n<li>Hacking proprietary protocols with pandas<\/li>\n<li>Predicting Windows binary download links with Jupyter notebooks<\/li>\n<li>Comparison of collaboration methods between MSTICpy and Splunk SIEM<\/li>\n<li>Building a community around notebooks for DFIR and SecOps<\/li>\n<li>Building data-driven security tools with Streamlit<\/li>\n<li>Red teaming LLMs with Jupyter notebooks<\/li>\n<li>Automating adversary emulation<\/li>\n<li>Applying machine learning for C2 beaconing detection<\/li>\n<\/ul>\n<p>Although this is not a Microsoft event, our Microsoft Threat Intelligence community is delighted to be involved in helping organize and deliver talks.&nbsp;<a href=\"https:\/\/aka.ms\/JupyterthonRegistration\">Registration is free<\/a>&nbsp;and sessions will be streamed on YouTube Live on both days. We have also set offset times on each day this year to make it easier for people in different time zones to join. Provisional times are:<\/p>\n<figure class=\"wp-block-table table\">\n<table>\n<tbody>\n<tr>\n<td>Thursday, February 15<\/td>\n<td>4:00 PM to 9:00 PM Eastern Time<\/td>\n<\/tr>\n<tr>\n<td>Friday, February 16<\/td>\n<td>11:00 AM to 4:00 PM Eastern Time<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p>We\u2019ll also have a dedicated <a href=\"https:\/\/discordapp.com\/channels\/717911137915764877\/903002501756903485\">Discord channel<\/a> for discussions and session Q&amp;A.<\/p>\n<p>We are also inviting analysts and engineers who may be interested in talking about a cool notebook or some interesting techniques or technology to submit their proposal for a session <a href=\"https:\/\/aka.ms\/JupyterthonCFN\">here<\/a>. There are still some openings for 30-minute, 15-minute, and 5-minute sessions. <\/p>\n<p>For more information, as well as recordings of previous years sessions and workshops, visit the InfoSec Jupyterthon page at: <a href=\"https:\/\/infosecjupyterthon.com\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/infosecjupyterthon.com<\/a><\/p>\n<p>We\u2019re looking forward to seeing you there!<\/p>\n<h2 class=\"wp-block-heading\" id=\"learn-more\">Learn more<\/h2>\n<p>For the latest security research from the Microsoft Threat Intelligence community, check out the Microsoft Threat Intelligence Blog:&nbsp;<a href=\"https:\/\/aka.ms\/threatintelblog\">https:\/\/aka.ms\/threatintelblog<\/a>.<\/p>\n<p>To get notified about new publications and to join discussions on social media, follow us on X (formerly Twitter) at&nbsp;<a href=\"https:\/\/twitter.com\/MsftSecIntel\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/twitter.com\/MsftSecIntel<\/a>.<\/p>\n<p>To hear stories and insights from the Microsoft Threat Intelligence community about the ever-evolving threat landscape, listen to the Microsoft Threat Intelligence podcast: <a href=\"https:\/\/thecyberwire.com\/podcasts\/microsoft-threat-intelligence\">https:\/\/thecyberwire.com\/podcasts\/microsoft-threat-intelligence<\/a>.<\/p>\n<p>The post <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/01\/29\/join-us-at-infosec-jupyterthon-2024\/\">Join us at InfoSec Jupyterthon 2024<\/a> appeared first on <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/01\/29\/join-us-at-infosec-jupyterthon-2024\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Microsoft Threat Intelligence| Date: Mon, 29 Jan 2024 18:00:00 +0000<\/strong><\/p>\n<p>Jupyter notebooks are continuing to grow in popularity in information security as an alternative or supplement to mainstream security operations center (SOC) tools. Notebooks can be used interactively for threat detection and response, or as automated tasks in a larger pipeline. Their flexibility and ability to combine code, data analysis, and visualization in a single, [&#8230;]<\/p>\n<p>The post <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/01\/29\/join-us-at-infosec-jupyterthon-2024\/\">Join us at InfoSec Jupyterthon 2024<\/a> appeared first on <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[],"class_list":["post-23830","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23830","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23830"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23830\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23830"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23830"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23830"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}