Copyright © 2015 Splunk Inc.
Splunk @ The University of Maryland
Kevin Shivers
Manager, Security Technical Services
2
Disclaimer
This is not an endorsement of any company, product, or service by the
University of Maryland or the State of Maryland. Any and all statements
made in this presentation are mine and mine alone and do not in any way
represent an official statement from the University of Maryland or the
State of Maryland.
3
Agenda
• Introduction
• About you, UMD, and myself
• Our challenges and opportunities
• Use Cases
• Incident investigation
• Breach detection
• Compliance
• Conclusion
• Where we’re headed, best practices, and lessons learned
4
About You
New to Splunk? Seasoned vet?
Security professional? IT Operations? Management? Auditor?
Just here for the free t-shirt, food, and happy hour?
Higher Ed?
State of MD?
5
About The University of Maryland, College Park
• Founded in 1856
• Public research university
• ~37,000 students, ~10,000 faculty/staff
• Ranked 19th among public universities by U.S.
News & World Report and 16th among public
universities by Forbes
• Extremely decentralized IT
• Division of IT – Provides centralized IT services
(network, e-mail, phones, mainframe, payroll, ”the ISP for campus”)
6
About Me
• Security practitioner for 17 years
• At Maryland for 13 years
• Stints at Sourcefire and Network Associates (McAfee)
• Primary responsibilities
• Lead the University’s IT security operations
• Architecting new & better IT security technologies
• Splunk user since April 2013
• Spent 4 days inside Chernobyl and lived to
tell the tale
7
About The Security Team
• CISO
• Security Engineering (1.5 FTE)
– Develop and Implement new & better security technologies, integrations,
project/product security assessments, data enrichment
• Security Operations (2.5 FTE)
– Incident Response & Investigation, forensics, eDiscovery, data enrichment,
vulnerability assessment, data loss prevention
• Compliance (3 FTE)
– Conduct internal audits, coordinate external auditors
• User awareness and education (1 FTE + 2 grad students)
– IT misuse/harassment, DMCA complaints, education
8
The Journey
• Address manual log aggregation / searching
• Perform correlation searching between multiple sources
• Faster building of reports and dashboards, compliance requirement
• Quick remediation of advanced persistent threat (APT)
• Early breach detection, mitigation, improving security posture
• Continuous monitoring
2013
2015
Security
Use
Cases
Focus
On
Visibility
9
Before Splunk: Scattered Logs, Limited Visibility
• Challenges
• Logs stored everywhere, hours lost logging in / searching
• Networking, Unix, Windows, Email, etc.
• Manual correlation required to find needle in haystack
• Sec and Ops needed common searches, reports, visualizations
• Legacy SIEMs lacked ad-hoc search capabilities
• Pre-defined rules only, limited ability to dig through data
• Response time measured in hours/days
Needed a faster
way to get
answers
10
With Splunk: Flexibility, Fast Time to Value
• Solution
• Aggregate multiple data sources
• Not just security products but other IT assets / data sources
• Build custom searches and reports into existing process
• Ad-hoc searches, platform-independent UI
• Continuous monitoring across entire infrastructure
• Visibility needed for breach detection and IR
• Response time measured in minutes
“Splunk works
how my group’s
brain works”
11
Real-time Campus Threat Detection/Prevention with Splunk
Before Splunk
Police discovered suspicious online posting at 3am
Contacted us asking to track post to the sender
Website with posting used:
– Several distributed destination IP addresses
– The source IP of one of our wireless NATs
Manual effort to track the activity to an internal IP
address and then a user took hours
With Splunk
Campus police again came in the wee hours w/ emergency need to trace a post back to user
Again, posted via our wireless network with distributed web hosting presence
With Splunk it took 2 minutes to trace & police were able to help the user
Use of Splunk at UMD
Intrusion Detection
Real-life Incident
Investigations
Security Alerts &
Threat Response
Compliance & Reporting
“If Splunk were taken away from me, I would quit my job.
It has solved a ton of problems and made my life so much easier.”
• Spike in a Windows usage log triggered alert
• Ops team became suspicious while investigating that particular alert
• Quick set of ad-hoc searches conducted
• Clean handoff to sec team for forensic investigation / log review
• APT eliminated from environment in days
• During holiday season; most of that time spent on eradication and recovery
vs detection and analysis
• All handled in house vs having to bring in an external firm
Use Case – Fast, Operationalized IR for APT
• APT type characterized based on incident
• Phishing email origin, subsequent compromised accts / systems
• Alerts configured based on APT detected
• Auto-instantiated scripts to configure blocking rules
• External pen test stymied couple months later
• Proved effectiveness of remediation steps taken
Use Case – Effective Remediation for APT
• Attacker able to compromise password reset tool
• Able to change passwords – just those needed to access a critical database w/ 289k records
• Within 30 minutes, team had contextualized entire breach
• Chain of events from “users had not changed their passwords” to “database breached”
• Focus on improving security posture, not investigating
• Investigation took hours, not days or weeks
• Avoided $250k- $500k cost for bring in external firm
Use Case – Early Breach Detection
16
Use Case – Compliance & Reporting
Requirement to review logs for failed logins
and reboots on network devices
Splunk SDK for Python & Python-fu to search
through logs and generate a ticket in our
trouble ticketing system for SOC staff to
review
Auditable list of closed tickets to demonstrate
logs are being reviewed and acted upon
17
Dashboards
Splunk at University of Maryland
• Data sources
– Firewalls - IPS/NGFW
– Wireless NAT logs - Linux server logs
– Web server logs - Auth logs (AD/kerb/CAS/MFA)
– Windows server logs - Mail server logs
– Database audit logs - VPN logs
• Data Volume
• Indexing ~190 GB per day (doubled since 2013)
• Waiting for more license capacity for another 200+ GB
• Users
40 regular users 115 infrequent users
18
Universal Forwarders
4 Indexers
General search head + ES Search Head
19
Splunk Applications
Splunk for Palo Alto
Splunk App for AWS
Cisco Security Suite
Splunk on Splunk
DB Connect
Splunk SDK for Python
20
Splunk Roadmap at UMD
Single-site -> Multi-site
Larger license & more logs
Splunk as a Service for campus
The great migration to AWS
Metrics & dashboards for campus administrators
Backend for self service tools for IT staff
Splunk in the classroom
More correlation & data enrichment
More automation & integration
21
Best Practices and Lessons Learned
22
Best Practices and Lessons Learned
Log the important things
– Admin/privileged users logins (especially after hours)
 Regular user logins/failed logins useful too
– New admin/privileged user accounts created
– System/service restarts
– Critical failures
– Web access logs
 Interesting user agents, access to web app admin pages, SQLi, XSS attempts, etc
– Access to DBs w/ PII
– Virus/Malware alerts
Review at least weekly, daily if you can (especially: after hours logins,
new accounts, sys/service restarts, AV alerts)
23
Best Practices and Lessons Learned
GET THE FASTEST STORAGE YOU CAN AFFORD
NTP is your friend – sync time early & often
Define your searches as much as possible (NO index=*)
Splunk’s documentation – Excellent resource. RTFM!
Splunk Answers – great resource
.conf – Like drinking from a fire hose
Online user groups
– Higher Ed mailing list hosted by OSU (contact me for info)
2
Thank You!
Contact: kts@umd.edu
Note: I am hiring – Security Engineer and SOC Analyst positions!

More Related Content

PPTX
SplunkLive! Customer Presentation – Virtustream
PPTX
SplunkLive! Philadelphia - University of Scranton
PPTX
Managing Security with Splunk Enterprise
PPTX
Security crawl walk run presentation mckay v1 2017
PPTX
Higher Education Testimonials from Splunk Customers
PDF
Threat Hunting
PPTX
Advanced persistent threat (apt)
PDF
Threat Hunting with Splunk
SplunkLive! Customer Presentation – Virtustream
SplunkLive! Philadelphia - University of Scranton
Managing Security with Splunk Enterprise
Security crawl walk run presentation mckay v1 2017
Higher Education Testimonials from Splunk Customers
Threat Hunting
Advanced persistent threat (apt)
Threat Hunting with Splunk

What's hot (20)

PPTX
Splunk at the Bank of England
PDF
Workshop threat-hunting
PDF
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
PPTX
Threat Hunting with Splunk
PPTX
Enterprise Sec + User Bahavior Analytics
PPTX
Threat Hunting with Splunk
PDF
Trustport - Roman Veleba
PPTX
User and entity behavior analytics: building an effective solution
PPTX
Splunk EMEA Webinar: Scoping infections and disrupting breaches
PPTX
Infosecurity Europe 2016: Operationalizing Threat Intelligence
PDF
Toward revealing Advanced Persistence Threats in your organization - Public
PPTX
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
PPTX
Remote forensics fsec2016 delija draft
PPTX
Splunk Discovery: Warsaw 2018 - Getting Data In
PDF
Splunk Live! Utrecht 2016 - CERT EU
PPTX
SplunkLive! Milano 2016 - Splunk Plenary Session
PDF
S4x20 Forescout Presentation
PPTX
Webinar notes: Welcome to your worst day ever
PPTX
Ethical hacking
PDF
Introduction to the advanced persistent threat and hactivism
Splunk at the Bank of England
Workshop threat-hunting
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Threat Hunting with Splunk
Enterprise Sec + User Bahavior Analytics
Threat Hunting with Splunk
Trustport - Roman Veleba
User and entity behavior analytics: building an effective solution
Splunk EMEA Webinar: Scoping infections and disrupting breaches
Infosecurity Europe 2016: Operationalizing Threat Intelligence
Toward revealing Advanced Persistence Threats in your organization - Public
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
Remote forensics fsec2016 delija draft
Splunk Discovery: Warsaw 2018 - Getting Data In
Splunk Live! Utrecht 2016 - CERT EU
SplunkLive! Milano 2016 - Splunk Plenary Session
S4x20 Forescout Presentation
Webinar notes: Welcome to your worst day ever
Ethical hacking
Introduction to the advanced persistent threat and hactivism
Ad

Similar to SplunkLive! Customer Presentation – UMCP (20)

PPTX
Splunk at Weill Cornell Medical College
PPTX
SplunkLive! Austin Customer Presentation - Baylor
PDF
IT Operations Breakout Session
PDF
Analytics Driven SIEM Workshop
PPTX
Splunk User Group Edinburgh - November Event
PPTX
SplunkLive! Paris 2018: Intro to Security Analytics Methods
PPTX
Customer Presentation, FirstSolar
PPTX
SplunkLive! Munich 2018: Intro to Security Analytics Methods
PDF
Threat Hunting Workshop
PPTX
Splunk for Security Breakout Session
PPTX
Using Splunk to Protect Students, Faculty and the University
PPTX
Gov & Education Day 2015 - Mark Mendelson, UCLA
PPTX
SplunkLive! Splunk for Security
PPTX
SplunkLive! Cincinnati - E.W. Scripps - Oct 2012
PDF
Wipro Customer Presentation
PPTX
Splunk for Security: Background & Customer Case Study
PDF
SplunkLive! Stockholm 2015 breakout - Analytics based security
PPT
SplunkLive! Customer Presentation - Penn State Hershey Medical Center
PPTX
Customer Presentation with a Healthcare Company
PPTX
SplunkLive! Customer Presentation – HCA
Splunk at Weill Cornell Medical College
SplunkLive! Austin Customer Presentation - Baylor
IT Operations Breakout Session
Analytics Driven SIEM Workshop
Splunk User Group Edinburgh - November Event
SplunkLive! Paris 2018: Intro to Security Analytics Methods
Customer Presentation, FirstSolar
SplunkLive! Munich 2018: Intro to Security Analytics Methods
Threat Hunting Workshop
Splunk for Security Breakout Session
Using Splunk to Protect Students, Faculty and the University
Gov & Education Day 2015 - Mark Mendelson, UCLA
SplunkLive! Splunk for Security
SplunkLive! Cincinnati - E.W. Scripps - Oct 2012
Wipro Customer Presentation
Splunk for Security: Background & Customer Case Study
SplunkLive! Stockholm 2015 breakout - Analytics based security
SplunkLive! Customer Presentation - Penn State Hershey Medical Center
Customer Presentation with a Healthcare Company
SplunkLive! Customer Presentation – HCA
Ad

More from Splunk (20)

PDF
Splunk Leadership Forum Wien - 20.05.2025
PDF
Splunk Security Update | Public Sector Summit Germany 2025
PDF
Building Resilience with Energy Management for the Public Sector
PDF
IT-Lagebild: Observability for Resilience (SVA)
PDF
Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)
PDF
Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)
PDF
Praktische Erfahrungen mit dem Attack Analyser (gematik)
PDF
Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)
PDF
Security - Mit Sicherheit zum Erfolg (Telekom)
PDF
One Cisco - Splunk Public Sector Summit Germany April 2025
PDF
.conf Go 2023 - Data analysis as a routine
PDF
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
PDF
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
PDF
.conf Go 2023 - Raiffeisen Bank International
PDF
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
PDF
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
PDF
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
PDF
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
PDF
.conf go 2023 - De NOC a CSIRT (Cellnex)
PDF
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
Splunk Leadership Forum Wien - 20.05.2025
Splunk Security Update | Public Sector Summit Germany 2025
Building Resilience with Energy Management for the Public Sector
IT-Lagebild: Observability for Resilience (SVA)
Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)
Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)
Praktische Erfahrungen mit dem Attack Analyser (gematik)
Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)
Security - Mit Sicherheit zum Erfolg (Telekom)
One Cisco - Splunk Public Sector Summit Germany April 2025
.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - De NOC a CSIRT (Cellnex)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)

Recently uploaded (20)

PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
STKI Israel Market Study 2025 version august
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
Tartificialntelligence_presentation.pptx
PDF
CloudStack 4.21: First Look Webinar slides
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
A review of recent deep learning applications in wood surface defect identifi...
PPTX
observCloud-Native Containerability and monitoring.pptx
PPTX
The various Industrial Revolutions .pptx
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Assigned Numbers - 2025 - Bluetooth® Document
1 - Historical Antecedents, Social Consideration.pdf
Getting started with AI Agents and Multi-Agent Systems
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
STKI Israel Market Study 2025 version august
Group 1 Presentation -Planning and Decision Making .pptx
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Chapter 5: Probability Theory and Statistics
Tartificialntelligence_presentation.pptx
CloudStack 4.21: First Look Webinar slides
sustainability-14-14877-v2.pddhzftheheeeee
A review of recent deep learning applications in wood surface defect identifi...
observCloud-Native Containerability and monitoring.pptx
The various Industrial Revolutions .pptx
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
A comparative study of natural language inference in Swahili using monolingua...
Enhancing emotion recognition model for a student engagement use case through...
Hindi spoken digit analysis for native and non-native speakers
Assigned Numbers - 2025 - Bluetooth® Document

SplunkLive! Customer Presentation – UMCP

  • 1. Copyright © 2015 Splunk Inc. Splunk @ The University of Maryland Kevin Shivers Manager, Security Technical Services
  • 2. 2 Disclaimer This is not an endorsement of any company, product, or service by the University of Maryland or the State of Maryland. Any and all statements made in this presentation are mine and mine alone and do not in any way represent an official statement from the University of Maryland or the State of Maryland.
  • 3. 3 Agenda • Introduction • About you, UMD, and myself • Our challenges and opportunities • Use Cases • Incident investigation • Breach detection • Compliance • Conclusion • Where we’re headed, best practices, and lessons learned
  • 4. 4 About You New to Splunk? Seasoned vet? Security professional? IT Operations? Management? Auditor? Just here for the free t-shirt, food, and happy hour? Higher Ed? State of MD?
  • 5. 5 About The University of Maryland, College Park • Founded in 1856 • Public research university • ~37,000 students, ~10,000 faculty/staff • Ranked 19th among public universities by U.S. News & World Report and 16th among public universities by Forbes • Extremely decentralized IT • Division of IT – Provides centralized IT services (network, e-mail, phones, mainframe, payroll, ”the ISP for campus”)
  • 6. 6 About Me • Security practitioner for 17 years • At Maryland for 13 years • Stints at Sourcefire and Network Associates (McAfee) • Primary responsibilities • Lead the University’s IT security operations • Architecting new & better IT security technologies • Splunk user since April 2013 • Spent 4 days inside Chernobyl and lived to tell the tale
  • 7. 7 About The Security Team • CISO • Security Engineering (1.5 FTE) – Develop and Implement new & better security technologies, integrations, project/product security assessments, data enrichment • Security Operations (2.5 FTE) – Incident Response & Investigation, forensics, eDiscovery, data enrichment, vulnerability assessment, data loss prevention • Compliance (3 FTE) – Conduct internal audits, coordinate external auditors • User awareness and education (1 FTE + 2 grad students) – IT misuse/harassment, DMCA complaints, education
  • 8. 8 The Journey • Address manual log aggregation / searching • Perform correlation searching between multiple sources • Faster building of reports and dashboards, compliance requirement • Quick remediation of advanced persistent threat (APT) • Early breach detection, mitigation, improving security posture • Continuous monitoring 2013 2015 Security Use Cases Focus On Visibility
  • 9. 9 Before Splunk: Scattered Logs, Limited Visibility • Challenges • Logs stored everywhere, hours lost logging in / searching • Networking, Unix, Windows, Email, etc. • Manual correlation required to find needle in haystack • Sec and Ops needed common searches, reports, visualizations • Legacy SIEMs lacked ad-hoc search capabilities • Pre-defined rules only, limited ability to dig through data • Response time measured in hours/days Needed a faster way to get answers
  • 10. 10 With Splunk: Flexibility, Fast Time to Value • Solution • Aggregate multiple data sources • Not just security products but other IT assets / data sources • Build custom searches and reports into existing process • Ad-hoc searches, platform-independent UI • Continuous monitoring across entire infrastructure • Visibility needed for breach detection and IR • Response time measured in minutes “Splunk works how my group’s brain works”
  • 11. 11 Real-time Campus Threat Detection/Prevention with Splunk Before Splunk Police discovered suspicious online posting at 3am Contacted us asking to track post to the sender Website with posting used: – Several distributed destination IP addresses – The source IP of one of our wireless NATs Manual effort to track the activity to an internal IP address and then a user took hours With Splunk Campus police again came in the wee hours w/ emergency need to trace a post back to user Again, posted via our wireless network with distributed web hosting presence With Splunk it took 2 minutes to trace & police were able to help the user
  • 12. Use of Splunk at UMD Intrusion Detection Real-life Incident Investigations Security Alerts & Threat Response Compliance & Reporting “If Splunk were taken away from me, I would quit my job. It has solved a ton of problems and made my life so much easier.”
  • 13. • Spike in a Windows usage log triggered alert • Ops team became suspicious while investigating that particular alert • Quick set of ad-hoc searches conducted • Clean handoff to sec team for forensic investigation / log review • APT eliminated from environment in days • During holiday season; most of that time spent on eradication and recovery vs detection and analysis • All handled in house vs having to bring in an external firm Use Case – Fast, Operationalized IR for APT
  • 14. • APT type characterized based on incident • Phishing email origin, subsequent compromised accts / systems • Alerts configured based on APT detected • Auto-instantiated scripts to configure blocking rules • External pen test stymied couple months later • Proved effectiveness of remediation steps taken Use Case – Effective Remediation for APT
  • 15. • Attacker able to compromise password reset tool • Able to change passwords – just those needed to access a critical database w/ 289k records • Within 30 minutes, team had contextualized entire breach • Chain of events from “users had not changed their passwords” to “database breached” • Focus on improving security posture, not investigating • Investigation took hours, not days or weeks • Avoided $250k- $500k cost for bring in external firm Use Case – Early Breach Detection
  • 16. 16 Use Case – Compliance & Reporting Requirement to review logs for failed logins and reboots on network devices Splunk SDK for Python & Python-fu to search through logs and generate a ticket in our trouble ticketing system for SOC staff to review Auditable list of closed tickets to demonstrate logs are being reviewed and acted upon
  • 18. Splunk at University of Maryland • Data sources – Firewalls - IPS/NGFW – Wireless NAT logs - Linux server logs – Web server logs - Auth logs (AD/kerb/CAS/MFA) – Windows server logs - Mail server logs – Database audit logs - VPN logs • Data Volume • Indexing ~190 GB per day (doubled since 2013) • Waiting for more license capacity for another 200+ GB • Users 40 regular users 115 infrequent users 18 Universal Forwarders 4 Indexers General search head + ES Search Head
  • 19. 19 Splunk Applications Splunk for Palo Alto Splunk App for AWS Cisco Security Suite Splunk on Splunk DB Connect Splunk SDK for Python
  • 20. 20 Splunk Roadmap at UMD Single-site -> Multi-site Larger license & more logs Splunk as a Service for campus The great migration to AWS Metrics & dashboards for campus administrators Backend for self service tools for IT staff Splunk in the classroom More correlation & data enrichment More automation & integration
  • 21. 21 Best Practices and Lessons Learned
  • 22. 22 Best Practices and Lessons Learned Log the important things – Admin/privileged users logins (especially after hours)  Regular user logins/failed logins useful too – New admin/privileged user accounts created – System/service restarts – Critical failures – Web access logs  Interesting user agents, access to web app admin pages, SQLi, XSS attempts, etc – Access to DBs w/ PII – Virus/Malware alerts Review at least weekly, daily if you can (especially: after hours logins, new accounts, sys/service restarts, AV alerts)
  • 23. 23 Best Practices and Lessons Learned GET THE FASTEST STORAGE YOU CAN AFFORD NTP is your friend – sync time early & often Define your searches as much as possible (NO index=*) Splunk’s documentation – Excellent resource. RTFM! Splunk Answers – great resource .conf – Like drinking from a fire hose Online user groups – Higher Ed mailing list hosted by OSU (contact me for info) 2
  • 24. Thank You! Contact: kts@umd.edu Note: I am hiring – Security Engineer and SOC Analyst positions!