BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//pretalx.com//hack-lu-2025//talk//FEBNLJ
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-hack-lu-2025-FEBNLJ@pretalx.com
DTSTART;TZID=CET:20251022T173000
DTEND;TZID=CET:20251022T180000
DESCRIPTION:The Zeek network monitor offers a range of mechanisms to intera
 ct with it while up and running. Examples include its ability to asynchron
 ously ingest intel data\, exchange Zeek events with custom-built services\
 , call out to web APIs via Javascript\, load and save runtime state\, and 
 produce operational telemetry. These features provide powerful means to in
 tegrate Zeek into an organization's cybersecurity infrastructure\, taking 
 it far beyond a mere\nproducer of network logs.\n\nIn this talk I will wal
 k through these features\, outline their relative pros and cons\, and give
  examples of real-world applications they enable\, including machine learn
 ing models\, threat intel platforms like MISP\, and "round-tripping" of ne
 twork inventory data. This talk is ideal for users who have gained initial
  experience with running Zeek\, and are looking to get more out of their d
 eployment. Even if you've never used Zeek before\, you'll gain a better un
 derstanding of what it can provide for your network detection & response i
 nfrastructure.
DTSTAMP:20260317T023810Z
LOCATION:Europe
SUMMARY:Integrating Zeek With Third-Party Applications - Christian Kreibich
URL:https://pretalx.com/hack-lu-2025/talk/FEBNLJ/
END:VEVENT
END:VCALENDAR
