Tatsuya Hasegawa#

../../_images/TatsuyaHasegawa.png

Tatsuya Hasegawa is a self-employed Threat Hunter contracting with GoAhead in Japan. He is now engaged in “detection engineering” for cyberattack and internal threat and has experiences working as SOC analyst in MSSP, incident responder in CSIRT, Senior Principal Researcher at Cylance/BlackBerry. On the other hand, he has an aspect of application developer for data visualization on Splunk and his applications are listed in ‘https://splunkbase.splunk.com/apps?author=hacket’. Besides he is a contributor of MSTICpy and Unprotect Project. Regarding to certification and speech, he holds GX-FA, 7 GIACs, CISSP and CISA, and speaker of SANS APAC DFIR Summit 2023, FIRST T.C Amsterdam 2017 and 2018.

Talks (Eastern Timezone)#

Title

Abstract

Date

Time

Comparison of collaboration methods between MSTICpy and Splunk SIEM

Method 1 is simply to use msticpy’s Query Provider and Uploader. Method 2 is to use Splunk DSDL App for data transfering to Jupyter, and msticpy for only analysis. There are advantages and disadvantages in case by case. On the other hand, We have no worry about the choice in MS Sentinel which has the highly compatible method by using “Microsoft Sentinel ML Notebooks”. Audiences can take away about Splunk DSDL mechanism and the pros/cons for these Methods.

2024-02-15

19:30