This document provides an overview of a presentation on integrating additional data sources into the Elastic Logstash and Kibana (ELK) stack. It discusses using Security Onion for log collection and analysis and integrating vulnerability assessment data and host configuration data into ELK for enhanced security incident response. Examples are given of using Bro logs, Nmap scans, and Nessus/OpenVAS reports to query for related events and behaviors. Methods for collecting and parsing process and system information are also outlined.