Hi [[ session.user.profile.firstName ]]

Splunk Inc.

  • Date
  • Rating
  • Views
  • Getting Started with Security Operations: How to Access Basic Security Posture
    Getting Started with Security Operations: How to Access Basic Security Posture
    Jae Lee – Director Product Marketing, Security Markets, Splunk Recorded: Dec 18 2018 63 mins
    Assessing and monitoring basic security posture is critical. Security teams need the ability to identify and alert on a particular type of malicious activity, AND determine whether that alert is meaningful in a broader context.

    Splunk can help your organization get up and running very quickly with the ability to assess basic security posture. With Splunk, you can centralize security visibility and adopt an investigative mindset to answer questions like:

    - How secure are my endpoints?
    - What is happening on my network?
    - Where is it most critical for me to apply updates?
    - Are user accounts configured properly?
    - Is there any suspicious traffic going out?
    - How is overall security posture in my AWS environment?

    This webinar is perfect for organizations that are just getting started with formalizing their security operations. We’ll show you how with Splunk Security Essentials, a use case framework tool that you can download and stand up quickly to immediately glean security value using your own data sources.
  • Advancing Analytics-Driven Security
    Advancing Analytics-Driven Security
    Splunk Recorded: Dec 17 2018 5 mins
    Watch this short video demonstration to learn how Splunk Enterprise Security helps security practitioners detect, investigate and respond to internal and external attacks by simplifying threat management while minimizing risk to safeguard your business.
  • Splunk for Security Investigation: Ransomware
    Splunk for Security Investigation: Ransomware
    Splunk Recorded: Dec 17 2018 8 mins
    Welcome to the Splunk for Security Investigation Experience. In this video, learn how you can harness the power of analytics to easily detect hidden anomalies in the endpoint, so that you can prevent and mitigate advanced malware such as ransomware.
  • The 8 Biggest Mistakes IT Practitioners Make and How to Avoid Them
    The 8 Biggest Mistakes IT Practitioners Make and How to Avoid Them
    Kara Gillis, Director of Product Marketing, Splunk Recorded: Dec 11 2018 34 mins
    You’ve heard about the top trends in IT - but how do you use this information to take meaningful action? How do you encourage collaboration between the business, developers, and operations? How do you up-level IT as a service provider that reduces manual processes and troubleshooting without context to focus on strategic initiatives that impact important KPIs? By avoiding these 8 mistakes IT practitioners makes!

    In this webinar, we’ll talk through avoiding:

    -Friction between IT and the business
    -Cumbersome and difficult root cause analysis
    -Not preparing for Incident response
    -And many others!

    You’ll walk away with an understanding of how to apply lessons learned to your own organization and operate maximum scale, and maybe how Splunk can help!
  • Splunk's Machine Learning Toolkit: Technical Deep Dive
    Splunk's Machine Learning Toolkit: Technical Deep Dive
    Andrew Stein, Principal Product Manager, Machine Learning, Splunk Recorded: Dec 6 2018 47 mins
    In this first of two deep dive Machine Learning Toolkit (MLTK) webinars you will see Splunk’s MLTK in action. We will use the showcase examples in the MLTK and perform a technical demonstration of the MLTK’s user interface-supported algorithms using Splunk’s Search Processing Language (SPL) to create and operationalize machine learning models for any custom use case. You will learn:

    - How to use the components of the MLTK
    - How can you combine any MLTK Assistants
    - How can you use the MLTK with any search
  • Ask the Expert: A Technical Look at Running Splunk in Containers
    Ask the Expert: A Technical Look at Running Splunk in Containers
    Lee Calcote, Founder, Layer5.io and James Hodge, Area VP, Field Technology, Splunk EMEA Recorded: Nov 29 2018 30 mins
    Join this live 1-on-1 interview with James Hodge, Area VP, Field Technology at Splunk for an in-depth discussion on how to successfully leverage Splunk in Containers.

    Topics include:
    - What is the specific value that Splunk brings to the AWS customer?
    - Why use containers in the first instance?
    - What are some recommended use cases for running Splunk in containers?
    - What about Kubernetes?
    - How would you start thinking about migrating to Splunk or other applications to Cloud?

    This interview will be filmed live at AWS re:Invent in Las Vegas. Tun in for live Q&A and get all of your questions answered!
  • Machine Learning & Artificial Intelligence: Behind the Buzz Words
    Machine Learning & Artificial Intelligence: Behind the Buzz Words
    Edwin Yuen, Anne McCarthy, Stephen Luedtke Recorded: Oct 11 2018 32 mins
    Artificial intelligence and machine learning are the latest buzz words – but what does it actually mean to you and what should you do about it? Watch this webinar to hear ESG analyst Edwin Yuen and our Splunk experts discuss:

    ● AI & ML trends
    ● Benefits of leveraging AI & ML
    ● Barriers to adoption and how to overcome them
    ● AI & ML approaches – what’s right for you?
  • Find Fraud’s Fingerprints in Machine Data
    Find Fraud’s Fingerprints in Machine Data
    Gleb Esman, Senior Product Manager, Fraud Analytics and Research Matthew Joseff, Senior Security Specialist Recorded: Oct 10 2018 55 mins
    With the digitalization of our lives, organizations are creating new online services at a faster pace than ever before. Every organization is constantly developing and adding new services, leaving themselves vulnerable to fraudulent activities. The pressure is placed on fraud teams to stay informed and ahead of attackers, who are always creative to exploit new vulnerabilities.

    Join this webinar to learn:

    ● How to recognize examples of fraudulent activities in your environment
    ● How to more quickly find anomalies of transactions or behaviors of accounts that are fraudulent, acting fraudulently or being taken over
    ● Recommendations and best practices on how to get started detecting fraudulent patterns and activities
    ● How using machine data and Splunk’s analytics-driven security platform can help you onboard new data at the speed of the business to ensure that your fraud teams can detect and investigate quickly
  • Wie sich Initiativen zur digitalen Transformation auf Sicherheitsstrategien ausw
    Wie sich Initiativen zur digitalen Transformation auf Sicherheitsstrategien ausw
    Matthias Maier | Ruben van Vreeland | Rolf von Rössing | Ron Peeters Recorded: Oct 9 2018 48 mins
    Diese Session wird live aus Nürnberg übertragen.

    In diesem exklusiven Panel diskutieren Top-Branchenexperten, welchen Einfluß digitale Informationsinitiativen auf Sicherheitsstrategien haben können.

    Lernen Sie mehr über die folgenden Themen:
    - Welche Cyber-Risiken sind mit Initiativen zur digitalen Transformation verbunden?
    - Welche Rolle spielt das IT-Sicherheitsteam bei digitalen Transformationsprojekten?
    - Was sind die benötigten Kernfähigkeiten, und welches Umdenken ist in den IT-Sicherheitsabteilungen erforderlich?
    - Welche Technologien unterstützen dabei?


    Teilnehmer des Panels:

    Matthias Maier, Technology Evangelist, Splunk
    Ruben van Vreeland, CEO, BitSensor
    Ron Peeters, Managing Director, EMEA, Synack Inc.
    Rolf von Rössing, ISACA
  • Wie Machine Date Organisationen helfen kann, sich an neue Regulatorien
    Wie Machine Date Organisationen helfen kann, sich an neue Regulatorien
    Matthias Maier, Technology Evangelist, Splunk | Interviewer: Rolf von Rössing, ISACA Recorded: Oct 9 2018 23 mins
    Die 'Ask the Expert' Sitzung wird Ihnen live in DEUTSCH aus Nürnberg zur Verfügung gestellt.

    In diesem ausgewählten Panel stellen Top-Branchenexperten vor, wie Sie Ihr digitales Sicherheitsprogramm stärken - von der Verwaltung der Sicherheitstools bis zur gelebten Sicherheit.

    Erfahren Sie mehr über die Themen:
    - Warum reicht es nicht mehr aus, nur Sicherheitswerkzeuge zu implementieren und zu verwalten?
    - Was sind die Herausforderungen bei der Entwicklung eigener Sicherheitsfähigkeiten und Security Intelligence?
    - Was sind die Reifestufen, um dorthin zu gelangen?
    - Welche Personen (Know-how) / Prozesse und Technologien werden für den Erfolg benötigt?

    Matthias Maier ist Technical Evangelist für Splunk in EMEA und verantwortlich für die Kommunikation von Splunks Go-to-Market-Strategie in der Region. Er arbeitet eng mit Kunden zusammen, um zu verstehen, wie Maschinendaten neue Einblicke in Anwendungsbereitstellung, Geschäftsanalyse, IT-Betrieb, Internet of Things sowie Sicherheit und Compliance ermöglichen. Matthias hat ein besonderes Interesse und Fachwissen in Sachen Sicherheit und ist Autor der Splunk App für IP Reputation.

    Zuvor arbeitete Matthias bei TIBCO LogLogic und McAfee als Senior Technical Consultant. Er ist regelmäßiger Redner auf Konferenzen zu einer Reihe von Themen rund um Enterprise Technologien.

Embed in website or blog