Detection as Code: Modernizing Threat Detection with Sigma

OVERVIEW

NOTE: This training is a 2-day (8 hours/day) course from September 4 to 5.

This comprehensive training course explores the implementation of Detection as Code principles using Sigma, an open standard for SIEM rule definitions. Designed for security analysts, engineers, and architects, this course bridges the gap between traditional detection methods and modern DevOps practices. Participants will gain hands-on experience with industry-standard tools and methodologies that enable collaborative, consistent, and repeatable detection engineering. By leveraging Sigma’s platform-agnostic approach, you can apply this training regardless of which SIEM or security tool your organization uses.

In today’s rapidly evolving threat landscape, organizations need efficient, scalable, and maintainable detection capabilities. This course introduces participants to Detection as Code methodology using Sigma, enabling teams to create, test, version, and deploy detection rules using software development best practices. Participants will learn to transform manual, ad-hoc detection processes into structured, automated workflows that improve detection quality and organizational security posture. The curriculum addresses common challenges in detection engineering, including rule drift, inconsistent implementation, and the maintenance burden of detection content across multiple platforms. Through practical exercises and real-world scenarios, attendees will develop the skills to implement a sustainable detection engineering program that can adapt to emerging threats while maintaining operational efficiency. This approach not only enhances detection capabilities but also promotes cross-team collaboration between security operations and development teams.

Learning Objectives:
– Understand the core principles of Detection as Code and its advantages over traditional approaches
– Master Sigma syntax and rule creation for common attack techniques
– Implement version control and CI/CD pipelines for detection rules
– Develop testing frameworks to validate detection efficacy
– Convert Sigma rules to multiple SIEM platforms
– Apply threat intelligence to enhance detection capabilities
– Create a sustainable detection engineering program

Target Audience:
– SOC analysts
– Detection engineers
– Security architects
– Blue team members
– Threat Hunters

PREREQUISITES

– Basic understanding of cybersecurity concepts

– Familiarity with SIEM platform

– Experience with command-line interfaces

– Fundamental understanding of version control concepts

Presented By

Patrick Bareiss Headshot

PATRICK BAREISS

Principal Threat Researcher, Splunk