Join us for our August meetup at APS!
The agenda for the evening is:
6:00 PM - Doors open - food and beverages will be provided!
6:30 PM - Talks start
1. The Elastic Stack at APS by Tawny Tran, Robert Bahr, Anthony Yates
2. Elastic Stack + Machine Learning by Elastic's Henry Pak
8:00 PM - Wrap up talks, and stick around for some good conversations
Elastic Stack - Machine Learning
Data sets keep growing in size and complexity. Spotting infrastructure problems, cyber attacks, or business issues using only dashboards or rules become increasingly difficult as your data grows. Learn how the X-Pack Machine Learning feature can model the typical behavior of your time series data in real time to identify anomalies, streamline root cause analysis, and reduce false positives using an unsupervised approach.
Henry Pak is a Solutions Architect for Elastic based out of Los Angeles, CA. With a focus on data analytics and integration, Henry has been helping enterprises across a wide range of verticals more easily access and derive meaningful information from their data.
The Elastic Stack at APS
APS has been running the Elastic stack since summer of 2016 as a centralized logging repository. In this presentation, Tawny and Robert will talk about their Elastic Stack deployment and discuss several use cases. Anthony will further discuss how he and the Cyber Security team are tailoring the Elastic Stack to use as a SIEM in the Cyber Defense Center to more rapidly detect and respond to threats detected in the APS environment.
Tawny Tran is a Systems Analyst in Enterprise Analytics at APS. She's been working with elasticsearch for the past 2 years, primarily in the implementation of ELK and performing data analytics. Outside of work, she likes to travel, cook, and garden when it's not too hot outside.
Robert Bahr is a synthwave enthusiast, pomade connoisseur, PowerShell guru, data engineer and the greatest swordfighter in the world.
Anthony Yates is a Security Analyst at the APS Cyber Defense Center, primarily focused on threat research and incident response, with additional experience in penetration testing and exploit development. His current interest outside of work is improving on his home security and automation system.