Graylog experts gather together (virtually) to see product innovations and learn new skills. 

Don't miss out on how to use Graylog for:

    • Security Hygiene
    • Threat Hunting
    • Performance Monitoring
    • Network Administration & Security
    • DevOps / Cloud Apps



Join us as we kickoff Graylog GO with a few words from CEO Andy Grolnick and a preview of things to come from CTO and Founder Lennart Koopmann.

This talk will "reveal the magician’s secrets" on many "low-hanging fruit" hackers used to compromise enterprises in 2020. This will be a candid, detailed, step-by-step how-to attack chain walkthrough, explaining how and why the attacks work, and what steps can be taken to proactively defend against them. Participants will walk away with highly actionable tasks to immediately take to work on Monday to not only bump their security posture up a distinctive notch with little to no hit on their budgets but also inherently render future penetration tests more cost-effective by eliminating potential "cheap shots" that pentesters love to take. They will also, of course, walk away with the ability to become the domain admin of an average corporation from their couch in record time.  

Johnny is most well-known for his work on the TSA Master Key leaks and co-founding of the BurbSec community meetups. His infamous mixture of humor, raw sincerity and honest love of people lead to humorously candid discussions on the latest in Cybersecurity.

Shhhh . . . we'll be showing off some brand new stuff from the Graylog Security team. Be the first to see new capabilities while learning how Graylog can be used for Security Information and Event Management.

Wishing you could have a Data Scientist on staff? What if Graylog came with one built-in for uncovering unusual user and endpoint behavior indicating things like insider threats, data exfiltration, privileged movement, or flight risk?

Hear directly Graylog users on how they use Graylog to improve IT operations, identify security issues, and meet compliance mandates.

Insider secrets from the Customer Support team on what configuration and performance metrics you should be monitoring. Includes a quick demo of the new health module dashboards and Open Insights.

Graylog trainer extraordinaire Adam “Abe” Abernethy will guide you through a "crawl, walk, run" approach to visualizing your data, starting from choosing the right visualization to building a rapid investigation tool that covers an entire process in moments.

What if learning how to use a product could be as insightful as your favorite literary or cinematic hero? Inspired by game designer and speaker Kathy Sierra, Dulani Wallace will help you build your path to becoming a Graylog expert.

If you've ever wanted to learn more about tuning Graylog, in particular its index sets, look no further! This presentation covers tuning index sets in a fun, approachable way that will leave you feeling like a true wizard.

Real-world example from threat hunter and Graylog trainer, Adam "Abe" Abernethy who will provide expertise on building a successful security strategy, supported by a balance between threat detection and threat hunting with specific techniques for each.

Let's follow our noses and see where the data takes us as Product Expert Jeff Darrington teaches you how to look for threats that evaded your traps using Graylog.

Microsoft AD DNS has the ability to log all query data. Unfortunately, the format of those log entries is pretty heinous, and configuring all the useful features requires a bit of PowerShell wizardry. This is unfortunate as local DNS logs can reveal a huge amount of useful data including signs of misconfigured DNS as well as end-user device compromise. Getting your DNS data into a useful format should not be difficult and with the Graylog, a custom plugin, and a few Windows tricks, it's not. This talk will cover the basic configuration of AD DNS for logging and shipping those logs to Graylog as well as cover some best practices for gaining insight into your local DNS traffic.

src_user? user? username? uname? Better try them all! Or . . . you can join Product Manager Nick Carstensen to understand where your data is supposed to be at, why it is there, and how it got there. Nick will be discussing Graylog’s Illuminate functionality, parsing best practices, the Graylog Information Model, and normalization of logs.

Every organization is somewhere on the log management continuum, and every organization is collecting logs. Collecting logs is the act. Knowing what you want to do with those logs is the vision. Sit down with lead Solution Engineer, Joe Gross, to assess where you are on the continuum, where you need to be, and how to get from here to there.

We get it, major version upgrades are a PITA, can be scary, and often don't seem worth it. In this session, we'll show you how to upgrade from 3.x to 4.x quickly and painlessly plus show off all the great new features you'll get on the other side.

With IPinfo, you can pinpoint your users’ locations, customize their experiences, prevent fraud, ensure compliance, and so much more. Learn more about using IPinfo with Graylog in this session with CEO and Founder Ben Dowling.

Where do we go from here? We have big dreams and we want so share them with you and hear what you want to see from Graylog the next time we all get together.

Grab a drink and put your feet up - join us for some comic relief with Andrea Vahl. In addition to being a Social Media Consultant, Andrea regularly gets people to laugh and has performed at many events including the Women in Comedy Festival in Boston, World Series of Comedy, Chicago Women’s Funny Fest.

Engage with other people who are passionate about their Graylog!

  • Attend sessions presented by Graylog users
  • Ask questions to Graylog experts
  • Find out more about the product roadmap
  • "Meet" hundreds of Graylog users
  • Be the first to see new Graylog products