Loading Events

Using Jupyter Notebooks for Repeatable Investigation Automation

Home » Events » Using Jupyter Notebooks for Repeatable Investigation Automation

  • This event has passed so registration is closed.



Date and Time

November 4, 2020 @ 1:00 pm - 2:00 pm EST

Event Category

Web Conference


Candice Benson


Lisa O'Connell


Given the current economic climate and scrutinized security budgets as a result of COVID-19, security teams are finding it more difficult to fill gaps in their threat intelligence collection requirements, therefore limiting their potential effectiveness and efficiency.

This leaves analysts asking themselves questions like: if I’m starting an investigation from a single or list of indicators, how can I move faster and act as a force multiplier on my team? The resounding answer from seasoned security professionals is automation. In this webinar, join subject matter experts to learn how to harness the power of automation, use open source tools and data sources to build Jupyter Notebook playbooks, and effectively collaborate with team members.

In this webinar you will learn:
• The value of using automation in your investigations
• Practical strategies for collecting information on indicators
• How to take advantage of pre-existing Jupyter Notebooks playbooks


Lee Neely – Information Assurance APL, LLNL

Lee Neely is a senior IT and security professional at LLNL with over 30 years of extensive experience with a wide variety of technology and applications from point implementations to enterprise solutions. He teaches cyber security courses, and holds several security certifications including GMOB, GPEN, GWAPT, GAWN, GPYC, GEVA, CISSP, CISA, CISM and CRISC. He is a current ISSA International Board Member and former ISSA International Director, Member of the SANS NewsBites Editorial Board, SANS Analyst, and Security Weekly podcast host. You can keep up with Lee @lelandneely

See Lee Neely‘s full profile.


Chad Anderson – Senior Security Researcher, DomainTools, LLC

Chad Anderson is a Senior Security Researcher at DomainTools. His background is in security-focused operations and automation that he now applies to building, curating and exploring new data sets for security researchers. He has a particular interest in automation, network security and their intersection. His primary focus leans heavily on leveraging open source technologies to improve deployments, network security and systems administration at DomainTools.

See Chad Anderson‘s full profile.

Deirdre Peters

Deirdre Peters is a progressive leader with over 20 years of experience, responsible for leading IT audits, briefing executive leadership on risk exposures and internal control deficiencies and creating solutions to provide real-time access to system generated data though visual dashboards. She has co-authored corporate policy lead architect and project lead for implementing the Enterprise IP Roster Tool. As the Corporate Information Security Acquisitions and Divestitures Security Architecture lead, she led IT integration acquisitions totaling an estimated $5 billion. Deirdre led the design of Identity and Access Management architectures to provide automated report metrics leading to executive insight to data trends.

Deirdre holds a Bachelor of Science Degree in Computer Science, a Master of Science in Telecommunications Management, Six Sigma Green Belt Certified, Certified Information Systems Security Professional (CISSP), Security + and Microsoft Certified Systems Administrator (MCSA) industry certifications. In her spare time, Deirdre enjoys fitness, cooking and attending her son’s lacrosse, basketball and football games.

See Deirdre Peters‘s full profile.

ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.

Scroll to Top