SlideShare a Scribd company logo
Kendra Cooley
Circle City Con
June 11, 2017
We Don’t
Always Go
Lights &
Sirens
Who Am I
TECHNICAL
• B.S. Digital Forensics
• CISSP
• InfoSec Analyst – Duo
Security
• Incident Response
• Security Awareness
Training
NON-TECHNICAL
• Family
• Mom of three… fur
babies
• Memorizing movie lines
• Searching for new
music
• DIY projects
• Taking naps
Kendra Cooley - @4n6Kendra
objective
Make Incident Response (IR) more relatable
What to expect
• High-level overview of IR
• Focus on triage
• A new perspective
• Awesome pictures… some blood
• Corny jokes
Detection
Reporting
Triage
Analysis
Containment
Mitigation
Follow-up
Detection
Reporting
Triage
Analysis
Containment
Mitigation
Follow-up
Tell
somebody
Something
happened
Set the pace
What
happened
Stop the
thing
Fix the
problem
Learn from
it
Detection
Reporting
Triage
Analysis
Containment
Mitigation
Follow-up
Tell
somebody
Something
happened
Set the pace
What
happened
Stop the
thing
Fix the
problem
Learn from
it
The goals are the same
1. Identify the problem
2. Prevent further damage
3. Fix what is broken
WE ARE FIRST RESPONDERS
TOO!
NO TWO INCIDENTS ARE THE SAME
Stop Relying on the Category
INFOSEC
Phish
Malware
SQL Injection
Cross-Site Scripting
Denial of Service
Lost/Stolen Device
EMS
Car Accident
Shooting
Broken Bones
Labor
Heart attack
Hangnail
Triage is critical
• Focus on severity, not category
• Identify the functional and informational
impact
• Properly assign resources
Why?
• Category only tells us so much
• Avoid ‘Too many hands in the pot’
• IR needs structure and organization
TRIAGE SETS THE pace
Detection
Reporting
Triage
Analysis
Containment
Mitigation
Follow-up
It all starts with…
Detection
Reporting
Triage
Analysis
Containment
Mitigation
Follow-up
And then…
Detection & Reporting
InfoSec EMS
Tools
People
InfoSec EMS
Rely on
accurate
information
Detection
Reporting
Triage
Analysis
Containment
Mitigation
Follow-up
The most critical phase
Consider the following:
InfoSec EMS
False Alarm
Panic/Fear
Human LifeLivelihood
ASSESSING THE IMPACT
INFOSEC
FUNCTIONAL
ARE CRITICAL FUNCTIONS
DISRUPTED?
INFORMATIONAL
HAS DATA BEEN
COMPROMISED?
EMS
SITUATION
WHAT WAS REPORTED?
SEVERITY
IS IT LIFE THREATENING?
LET THE FUN BEGIN
Category: car accident
Scenario 1
Caller witnessed a
single car accident
One passenger: male,
26 years of age
Driver status: Out of the
vehicle, fully coherent
with a visibly broken
wrist
LOW PRIORITY
Additional resources
not needed
Urgency is low
Non-life threatening
Category: car accident
Scenario 2
Caller witnessed a car
accident
One passenger: male,
26 years of age
Driver status: Out of the
vehicle. Complaining of
dizziness. Laceration to
left side of his head
Medium PRIORITY
Additional resources
may be needed
Urgency is increased
Condition of patient
could rapidly change
Category: car accident
Scenario 3
Caller witnessed a
single car accident
One passenger: male,
mid-twenties
Driver status:
Unconscious
High PRIORITY
Additional resources
are likely needed
Urgency is high
Patient’s life is at stake
WHAT ABOUT
INFOSEC?
Category: Phishing campaign
Scenario 1
Employee reports a
suspicious email
They did not click
any links or open
attachments
LOW PRIORITY
Additional
resources not
needed
Urgency is low
No risk to business
functions or data
Category: Phishing campaign
Scenario 2
Employee reports a
suspicious email
immediately after:
• Clicking the link
• Entering their
credentials on a
fake Google site
Medium PRIORITY
Additional resources
possibly needed
Urgency is increased
Credentials are
compromised
Without action, the
situation could get
worse
Category: Phishing campaign
Scenario 3
Employee reports
odd email activity
What they know:
• Hundreds of
emails have
been sent from
their account
containing an
attachment
High PRIORITY
Account is
compromised
Additional
resources are
necessary for
damage control
Urgency is high
Spotting the similarities
Priority Level Car Accident Phishing Campaign
High
LIGHTS AND SIRENS
Additional resources needed
‘Worst case’ scenario
Medium
LIGHTS AND SIRENS
Additional resources may be needed
Scenario could potentially get worse
Low
Additional resources not needed
Unlikely to cause further damage
Something else could take priority over this
Why does this matter?
A new perspective
Seemingly similar
categories resulted
in extremely
responses
WE CAN’T
WORK
EVERY
INCIDENT
AT 100 MPH.
But wait, there’s more
Priority can change at any time
Detection
Reporting
Triage
Analysis
Containment
Mitigation
Follow-up
Structure and organization
How can we improve?
MANAGERS
• Support your Analysts
• Implement a strong IR
process
• Organize your
resources
• Put more emphasis on
triage
• Be flexible
ANALYSTS
• Trust your gut
• Focus less on the
category
• Understand the
information in front of
you
• Be flexible
Key Takeaways
• Triage is more than categorization
• Triage sets the tone for the rest of the process
• Treat each situation as unique
• Not every incident requires ‘lights and sirens’
Thank you!!
Kendra Cooley
@4n6Kendra
Ken4n6dra@gmail.com
We Don’t
Always Go
Lights &
Sirens

More Related Content

Similar to We Don't Always Go Lights and Sirens - Circle City Con 2017

Survey Research
Survey Research Survey Research
Survey Research
atrantham
 
Critical Analytical ThinkingPart II Heuristics and Bias.docx
Critical Analytical ThinkingPart II Heuristics and Bias.docxCritical Analytical ThinkingPart II Heuristics and Bias.docx
Critical Analytical ThinkingPart II Heuristics and Bias.docx
annettsparrow
 
5 Benefits of Using Reciprocity in Investigation Interviews
5 Benefits of Using Reciprocity in Investigation Interviews5 Benefits of Using Reciprocity in Investigation Interviews
5 Benefits of Using Reciprocity in Investigation Interviews
Case IQ
 
“New” Misconduct Challenges and Solutions for Investigating as We Move to a ...
“New” Misconduct Challenges and Solutions for Investigating as We Move to a ...“New” Misconduct Challenges and Solutions for Investigating as We Move to a ...
“New” Misconduct Challenges and Solutions for Investigating as We Move to a ...
Case IQ
 
Twitter libel for sxsw
Twitter libel for sxswTwitter libel for sxsw
Twitter libel for sxsw
Ellyn Angelotti
 
Counterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxCounterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptx
ZakiAhmed70
 
Treat a Breach Like a Customer, Not a Compliance Issue
Treat a Breach Like a Customer, Not a Compliance IssueTreat a Breach Like a Customer, Not a Compliance Issue
Treat a Breach Like a Customer, Not a Compliance Issue
Resilient Systems
 
Serial Killers Presentation1
Serial Killers Presentation1Serial Killers Presentation1
Serial Killers Presentation1
Taylor Leszczynski
 
Social Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneSocial Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:One
Inflection Point Global
 
PO 375 Intro to Survey Research
PO 375 Intro to Survey ResearchPO 375 Intro to Survey Research
PO 375 Intro to Survey Research
atrantham
 
Developing Analytic Technique and Defeating Cognitive Bias in Security
Developing Analytic Technique and Defeating Cognitive Bias in SecurityDeveloping Analytic Technique and Defeating Cognitive Bias in Security
Developing Analytic Technique and Defeating Cognitive Bias in Security
chrissanders88
 
POL SOC 360 Survey Research
POL SOC 360 Survey ResearchPOL SOC 360 Survey Research
POL SOC 360 Survey Research
atrantham
 
Media, Message & Mediums: Risk & Opportunity in the New World
Media, Message & Mediums: Risk & Opportunity in the New WorldMedia, Message & Mediums: Risk & Opportunity in the New World
Media, Message & Mediums: Risk & Opportunity in the New World
Jess Flynn
 
Online Identity- Part 1
Online Identity- Part 1Online Identity- Part 1
Online Identity- Part 1
KR_Barker
 
Data-Driven off a Cliff: Anti-Patterns in Evidence-Based Decision Making
Data-Driven off a Cliff: Anti-Patterns in Evidence-Based Decision MakingData-Driven off a Cliff: Anti-Patterns in Evidence-Based Decision Making
Data-Driven off a Cliff: Anti-Patterns in Evidence-Based Decision Making
indeedeng
 
Tips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftTips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity Theft
Case IQ
 
SEU Different Types of Credit Derivatives Questions.docx
SEU Different Types of Credit Derivatives Questions.docxSEU Different Types of Credit Derivatives Questions.docx
SEU Different Types of Credit Derivatives Questions.docx
write5
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Steve Poole
 
Etobicoke CPA Association Presentation 2014
Etobicoke CPA Association Presentation 2014Etobicoke CPA Association Presentation 2014
Etobicoke CPA Association Presentation 2014
Stephen McIntyre
 
Accidental Insider
Accidental InsiderAccidental Insider
Accidental Insider
Barry Caplin
 

Similar to We Don't Always Go Lights and Sirens - Circle City Con 2017 (20)

Survey Research
Survey Research Survey Research
Survey Research
 
Critical Analytical ThinkingPart II Heuristics and Bias.docx
Critical Analytical ThinkingPart II Heuristics and Bias.docxCritical Analytical ThinkingPart II Heuristics and Bias.docx
Critical Analytical ThinkingPart II Heuristics and Bias.docx
 
5 Benefits of Using Reciprocity in Investigation Interviews
5 Benefits of Using Reciprocity in Investigation Interviews5 Benefits of Using Reciprocity in Investigation Interviews
5 Benefits of Using Reciprocity in Investigation Interviews
 
“New” Misconduct Challenges and Solutions for Investigating as We Move to a ...
“New” Misconduct Challenges and Solutions for Investigating as We Move to a ...“New” Misconduct Challenges and Solutions for Investigating as We Move to a ...
“New” Misconduct Challenges and Solutions for Investigating as We Move to a ...
 
Twitter libel for sxsw
Twitter libel for sxswTwitter libel for sxsw
Twitter libel for sxsw
 
Counterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxCounterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptx
 
Treat a Breach Like a Customer, Not a Compliance Issue
Treat a Breach Like a Customer, Not a Compliance IssueTreat a Breach Like a Customer, Not a Compliance Issue
Treat a Breach Like a Customer, Not a Compliance Issue
 
Serial Killers Presentation1
Serial Killers Presentation1Serial Killers Presentation1
Serial Killers Presentation1
 
Social Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneSocial Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:One
 
PO 375 Intro to Survey Research
PO 375 Intro to Survey ResearchPO 375 Intro to Survey Research
PO 375 Intro to Survey Research
 
Developing Analytic Technique and Defeating Cognitive Bias in Security
Developing Analytic Technique and Defeating Cognitive Bias in SecurityDeveloping Analytic Technique and Defeating Cognitive Bias in Security
Developing Analytic Technique and Defeating Cognitive Bias in Security
 
POL SOC 360 Survey Research
POL SOC 360 Survey ResearchPOL SOC 360 Survey Research
POL SOC 360 Survey Research
 
Media, Message & Mediums: Risk & Opportunity in the New World
Media, Message & Mediums: Risk & Opportunity in the New WorldMedia, Message & Mediums: Risk & Opportunity in the New World
Media, Message & Mediums: Risk & Opportunity in the New World
 
Online Identity- Part 1
Online Identity- Part 1Online Identity- Part 1
Online Identity- Part 1
 
Data-Driven off a Cliff: Anti-Patterns in Evidence-Based Decision Making
Data-Driven off a Cliff: Anti-Patterns in Evidence-Based Decision MakingData-Driven off a Cliff: Anti-Patterns in Evidence-Based Decision Making
Data-Driven off a Cliff: Anti-Patterns in Evidence-Based Decision Making
 
Tips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftTips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity Theft
 
SEU Different Types of Credit Derivatives Questions.docx
SEU Different Types of Credit Derivatives Questions.docxSEU Different Types of Credit Derivatives Questions.docx
SEU Different Types of Credit Derivatives Questions.docx
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 
Etobicoke CPA Association Presentation 2014
Etobicoke CPA Association Presentation 2014Etobicoke CPA Association Presentation 2014
Etobicoke CPA Association Presentation 2014
 
Accidental Insider
Accidental InsiderAccidental Insider
Accidental Insider
 

Recently uploaded

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 

Recently uploaded (20)

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 

We Don't Always Go Lights and Sirens - Circle City Con 2017