Creating Effective Sigma Rules with AI

Creating Effective Sigma Rules with AI

Can Threat Detection be enhanced with AI? Ashish sat down with Dave Johnson, Senior Threat Intelligence Advisor at Feedly, at BSides SF 2024, where Dave also presented a talk.

Dave shares his journey in cyber threat intelligence, including his 15-year career with the FBI and his transition to the private sector. The conversation focuses on the innovative use of large language models (LLMs) to create Sigma rules for threat detection and the challenges faced along the way. Dave spoke about his four approaches to creating Sigma rules with AI, ultimately highlighting the benefits of prompt chaining and Retrieval Augmented Generation (RAG) systems.


Guest Socials: ⁠Dave's Linkedin

Podcast Twitter - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@CloudSecPod⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠

If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:

- ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Podcast- Youtube⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠

- ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Newsletter ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠

- ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security BootCamp


Questions asked:

(00:00) Introduction

(01:44) A word for our episode sponsor, Panoptica

(02:39) A bit about Dave Johnson

(03:33) What are Sigma Rules?

(04:36) Where to get started with Sigma Rules?

(05:27) Skills required to work with Sigma Rules

(06:32) The four approaches Dave took to Sigma Rules

(11:29) Are Sigma Rules complimentary to existing log systems?

(12:18) Challenges Dave had during his research

(14:09) Validating Sigma Rules

(16:01) Working on Sigma Rule Projects

(18:54) The Fun Section


Resources spoken about during the episode:

Dave's Website

SigmaHQ GitHub

Jaksot(345)

Is your Microsoft Azure Cosmos Database Keys Secure? - Cloud Security News

Is your Microsoft Azure Cosmos Database Keys Secure? - Cloud Security News

Cloud Security News this week - 1 Sep, 2021 Last Thursday, on the 26th of August 2021 - Microsoft warned thousands of its cloud computing customers, including some of the world's largest companies. ...

1 Syys 20212min

Cloud Hacking eSports | Ultimate Hacking Championship

Cloud Hacking eSports | Ultimate Hacking Championship

In this episode of the Virtual Coffee with Ashish edition, we spoke with Igor Rincon (@igor.rincon) creator of Ultimate Hacking Championship (@HackingEsports) & one of the host of UHC - Magno Logan (@...

29 Elo 20215min

Network Security in a Cloud Native World

Network Security in a Cloud Native World

In this episode of the Virtual Coffee with Ashish edition, we spoke with Karthik Prabhakar (@worldhopper) is an Advisor to AccuKnox (@AccuKnox). Episode ShowNotes, Links and Transcript on Cloud Securi...

26 Elo 202151min

AWS Re:inforce goes Virtual - Cloud Security News

AWS Re:inforce goes Virtual - Cloud Security News

Cloud Security News this week - 25 Aug, 2021 AWS is launching a new partner competency for managed security service providers (MSSPs) which will make their cloud software solutions and services avai...

25 Elo 20211min

THINKING OF MOVING A MONOLITH TO CLOUD NATIVE?

THINKING OF MOVING A MONOLITH TO CLOUD NATIVE?

In this episode of the Virtual Coffee with Ashish edition, we spoke with John Kinsella (@johnlkinsella) is a Cloud Native Contributor, co-host of Security Weekly and CTO of CySense. Episode ShowNotes,...

22 Elo 202152min

DO WE NEED LOGGING? - Building Observability Platform for Scale - Atlassian

DO WE NEED LOGGING? - Building Observability Platform for Scale - Atlassian

In this episode of the Virtual Coffee with Ashish edition, we spoke with Colby Funnel (Linkedin - @Colby) is a Development Manager at Atlassian(@Atlassian). Episode ShowNotes, Links and Transcript on ...

15 Elo 202140min

What is a SECURITY DATA LAKE?

What is a SECURITY DATA LAKE?

In this episode of the Virtual Coffee with Ashish edition, we spoke with Omer Singer (Linkedin-Omer Singer) is the Head of Cyber Security Strategy at Snowflake - The Data Cloud (@SnowflakeDB). Episode...

8 Elo 202149min

Security Logging is Changing | Observability & Tracing Explained

Security Logging is Changing | Observability & Tracing Explained

In this episode of the Virtual Coffee with Ashish edition, we spoke with Ted Young (@tedsuo) is a contributor along with AWS, Google Cloud, Microsoft Azure in the Observability eco-system. He is also ...

1 Elo 202148min