Home

Awesome

community-contributions

A collection of my presentations, blog posts, and other contributions to the information security community

DateAuthor(s)TitleType
10/15/2024David FrenchSecuring Your CI/CD Pipeline: Eliminate Long-Lived Credentials with Workload Identity FederationBlog
10/01/2024David FrenchMonitoring for Unexpected Rule Changes in Google Security OperationsBlog
09/25/2024David FrenchPractical Techniques for Monitoring Your Security Data PipelineBlog
09/08/2024David French, Wade WellsMaturing SecOps with Detection-as-Code @ Blue Team ConPresentation
08/06/2024David FrenchDetection Engineering Demystified Building Custom Detections for GitHub Enterprise @ BSides Las Vegas (Slides, Recording)Presentation
06/19/2024David FrenchMonitoring for Suspicious GitHub Activity with Google Security OperationsBlog
06/08/2024David FrenchFrom soup to nuts: Building a Detection-as-Code pipeline @ BSides San AntonioPresentation
05/18/2024David FrenchFrom soup to nuts: Building a Detection-as-Code pipeline @ BSides Dublin (Slides, Recording)Presentation
03/30/2024David FrenchFrom soup to nuts: Building a Detection-as-Code pipeline @ BSides San DiegoPresentation
03/06/2024David FrenchFrom soup to nuts: Building a Detection-as-Code pipeline @ FIRST Technical ColloquiumPresentation
01/30/2024David FrenchGetting Started with Detection-as-Code and Chronicle Security OperationsBlog
12/05/2023David FrenchDetecting Suspicious Domains in Chronicle Using Entity Enrichment DataBlog
07/27/2023David FrenchFrom soup to nuts: Building a Detection-as-Code pipelineBlog
07/12/2022David FrenchThreat hunting in Okta logsBlog
08/04/2021David French (Black Hat Bio)Black Hat Arsenal 2021: Using Dorothy to Test Okta SSO Visibility and DetectionPresentation
12/08/2020David FrenchDorothy: A tool to test security monitoring and detection for Okta environments Blog, PresentationTool
08/21/2020Brent Murphy, David FrenchSecurity operations: Cloud monitoring and detection with Elastic SecurityBlog
08/13/2020David French, Neil DesaiThreat hunting capture the flag with Elastic Security: BSides 2020Blog
08/11/2020Bobby Filar, David FrenchProblemChild: Discovering Anomalous Patterns based on Parent-Child Process RelationshipsPaper
08/11/2020David French, Devon KerrHow to Plan and Execute a HuntPresentation
07/11/2020David French, Daniel Stepanic, Devon Kerr, Justin Ibarra, Neil DesaiThreat Hunting Capture the Flag at BSides SATXCTF
03/24/2020David French, Brent MurphyAdversary tradecraft 101: Hunting for persistence using Elastic Security (Part 1, Part 2)Blog
03/20/2020David French, Bobby FilarA Chain Is No Stronger Than Its Weakest LNK @ BSides SLC (Video, Slides)Presentation
02/24/2020David French, Brent MurphyThe Elastic Guide to Threat HuntingBook
02/18/2020Brent Murphy, David FrenchHunting for persistence using Elastic SecurityWebinar
12/04/2019David FrenchRansomware, interrupted: Sodinokibi and the supply chainBlog
10/25/2019Bobby Filar, David French, Hyrum AndersonProblemChild: Discovering Anomalous Patterns based on Parent-Child Process Relationships @ CAMLIS (Slides, Video)Presentation
08/16/2019David FrenchDetecting Adversary Tradecraft with Image Load Event Logging and EQLBlog
10/09/2018David FrenchDetecting & Removing an Attacker’s WMI PersistenceBlog
10/02/2018David FrenchDetecting Attempts to Steal Passwords from MemoryBlog
10/02/2018David FrenchDetecting Attempts to Steal Passwords from the RegistryBlog
10/01/2018David FrenchHow to Setup “Cowrie” — An SSH HoneypotBlog
09/30/2018David French5-Minute Analysis of a Remote Access TrojanBlog
09/30/2018David FrenchDetecting Lateral MovementBlog
10/04/2017David FrenchPassive Reconnaissance Techniques for Your Defense @ FS-ISAC SummitPresentation