Hi [[ session.user.profile.firstName ]]

Splunk Inc.

  • Date
  • Rating
  • Views
  • 4 Data Sources to Improve your Security Posture
    4 Data Sources to Improve your Security Posture Brian Torres-Gil, Solutions Architect, Palo Alto Networks & Jae Lee, Security Solutions Marketing, Splunk Recorded: Nov 15 2017 53 mins
    Today’s complex, multi-faceted infosec challenges can cause IT and security teams to spend unnecessary cycles trying to perform the fundamentals – basic hygiene, assessing posture, and validating security “readiness”. With most organizations getting attacked weekly, ensuring these functions are efficient and effective is more important than ever.

    Join this webinar to learn how end-to-end security visibility is a critical first step to improving your security posture.

    In this session, we will demonstrate how using Splunk to combine endpoint, network, user activity, and threat intelligence from across the Palo Alto Networks Platform can enable you to effectively:

    - Identify malicious activity and gain key context to help prevent similar threats
    - Apply methods to help improve accuracy and further mitigate risk
    - Automate context gathering and response actions to accelerate investigations, and to more effectively contain and prevent threats
    - Get deeper insights with dashboards combining data from existing technology investments
  • The State of Security Operations: How Prepared Are You For An Attack?
    The State of Security Operations: How Prepared Are You For An Attack? Duncan Brown, IDC, Matthias Maier, Splunk, Nathaniel Ford, (ISC)² EMEA Recorded: Nov 8 2017 59 mins
    Cyberattacks are top of mind for organizations across the globe. In fact, 62 percent of firms are being attacked at least weekly and 145 percent are experiencing a rise in the number of security threats. But do organizations have the processes in place to investigate and effectively respond to these incidents? IDC recently surveyed security decision makers at 600 organizations to understand the state of security operations today.

    Join this webinar to hear from guest speaker Duncan Brown, Associate Vice President, Security Practice, IDC, and Matthias Maier, Security Product Marketing Manager, Splunk, and discover:

    ●The time and associated cost security teams spend on incident response and how you compare to your peers

    ●How organizations are coping with an average of 40 actionable security incidents per week

    ●Where teams are focusing their security efforts

    ●Why an analytics-driven approach can make security investigation more efficient and effective, reducing costs and improving security posture
  • The State of Security Operations
    The State of Security Operations Duncan Brown, Associate Vice President, European Security Practice at IDC & Jae Lee, Security Product Marketing, Splunk Recorded: Nov 2 2017 45 mins
    Cyber attacks are top of mind for organizations across the globe. In fact, 62 percent* of firms are being attacked at least weekly. But do organizations have the processes in place to investigate and effectively respond to these incidents?

    IDC recently surveyed security decision-makers at 600 organizations to understand the state of security operations today. Watch this on-demand session to learn -

    • The time and associated cost security teams spend on incident response and how you compare to your peers
    • How organizations are coping with an average of 40 actionable security incidents per week
    • Where teams are focusing their security efforts
    • What activities are currently happening within organizations to prepare for the GDPR
    • Why an analytics-driven approach can make security investigation more efficient and effective, reducing costs and improving security posture
  • Comprehensive Cyber Security & Incident Response: CISCO + Splunk
    Comprehensive Cyber Security & Incident Response: CISCO + Splunk Imran Islam, CISCO, Matthias Maier, Splunk, Adrian Davis, (ISC)² EMEA Recorded: Nov 1 2017 62 mins
    The Cisco Computer Security Incident Response Team (CSIRT) is a global team of information security professionals responsible for the 24/7 monitoring, investigation and incident response at one of the world’s largest and leading technology companies.

    Learn how Imran Islam, leader of Cisco’s EMEA/APAC CSIRT team relies on Splunk to help his team drive best practices in threat assessment, mitigation planning, incident detection and response, incident trend analysis, and the development of future security architecture.

    Join this webinar to hear Imran Islam discuss how Cisco drives CSIRT best practices:

    - CSIRT playbooks and automation methods

    - The importance of timely CSIRT data access, correlation & visualisation

    - CSIRT staffing approaches

    - CSIRT threat intelligence management

    - Driving CSIRT operational efficiency

    - The importance of CSIRT collaboration across the business during investigations

    - How CSIRT functions can increase business relevance

    - Learn about the importance of understanding your environment

    - Learn about the importance of having the right data

    - Learn the critical success factors for building a CSIRT Team and capabilities

    - Learn how to enable your security team to scale its ability to handle incidents and quickly find, validate, and resolve issues

    - Learn how to justify adding more resources to an incident response team

    - Learn how to introduce consistency into your security team for approaching and solving security problems.
  • How Splunk & AWS Enabled End-to-End Visibility for PagerDuty
    How Splunk & AWS Enabled End-to-End Visibility for PagerDuty David Potes, Solutions Architect, AWS; Erin Sweeney, Sr Director, Splunk; Arup Chakrabarti, Director of Engineering,PagerDuty Recorded: Oct 26 2017 55 mins
    Threats are evolving and emerging every day. PagerDuty needed to take a more proactive and efficient stance to monitor, investigate and triage threats and maintain their security posture on the AWS Cloud. Splunk’s analytics-driven security solution made it easy for PagerDuty to gain end-to-end visibility across their cloud environment. In this webinar, you’ll learn how PagerDuty gained the end-to-end visibility required to respond quickly and effectively to security threats using Splunk on AWS.

    Join us to Learn:

    •How to get started proactively identifying, scoping, and analyzing security threats.
    •The value of an analytics-driven security model.
    •How Splunk offers end-to-end visibility across your AWS environment.
  • Aflac Protects You. See Who Protects Them
    Aflac Protects You. See Who Protects Them DJ Goldsworthy, Director of Security Operations and Threat Management at Aflac Recorded: Oct 25 2017 65 mins
    In 2016, Aflac, a Fortune 500 company providing financial protection to more than 50 million people worldwide, embarked on a mission to build a custom threat intelligence system in response to the rapid increase in security threats targeting its network of 15,000 worldwide employees.

    Join this webinar to hear from DJ Goldsworthy, director of Security Operations and Threat Management at Aflac, about how Aflac deployed Splunk Enterprise Security at the heart of its internal Threat Intelligence System and augmented it with Splunk User Behavior Analytics to:

    • Automate threat hunting and 90 percent of its security metrics process in just two months
    • Replace a legacy SIEM and determine risk for automated remediation
    • Identify insider threats and rapidly investigate threats
    • Block more than 2 million connections with less than 12 false positives

    Girish Bhat, director of Security Product Marketing at Splunk, will share examples of Splunk customers that are to solving a wide range of security analytics use cases: Rapid Incident Detection and Investigation, Ransomware, External Attacks, Cyber Command Center and more.
  • A Day in the Life of a GDPR Breach
    A Day in the Life of a GDPR Breach Splunk’s Data Privacy Officer, Elizabeth Davies and Splunk’s Security Ninja, Matthias Maier Recorded: Oct 25 2017 64 mins
    You’re a CIO, CISO or DPO - and you’ve been woken up in the middle of
    the night because personal data held by your organization has been
    discovered for sale on the dark web. This disclosure puts the privacy of
    your customers at risk. What do you do next?
    Join this session to learn about the impact of GDPR and go through a
    breach investigation and response scenario as it would be after GDPR
    comes into effect in May 2018. You’ll hear from Splunk’s Data Privacy
    Officer Elizabeth Davies and Splunk’s Security Ninja Matthias Maier.

    What you'll learn:
    ● What breach response will look like under the GDPR
    ● What tools and processes a data privacy officer will rely on in
    case of a breach
    ● What departments and entities will be involved beyond IT
    ● What activities are currently happening within organizations to
    prepare for the GDPR
    ● What the consequences of the breach could be
  • Detection of Ransomware and Prevention Strategies
    Detection of Ransomware and Prevention Strategies James Brodsky, Sr. Security SME, Splunk Recorded: Oct 18 2017 64 mins
    Ransomware has moved from a nuisance targeting consumers to a serious threat to businesses and government agencies.

    In this session you will learn more about what ransomware is and how it works, followed by a live Splunk demonstration with data from a Windows ransomware infection.

    You will learn:

    - How to use Splunk Enterprise to hunt for ransomware IOCs
    - How to detect malicious endpoint behavior
    - Strategies for prevention
  • How to Stay Ahead of Today's Ransomware Realities
    How to Stay Ahead of Today's Ransomware Realities Ken Westin, Security Specialist, Splunk Recorded: Oct 11 2017 76 mins
    The recent ransomware outbreaks have destabilized business operations around the world.

    The most recent ransomware scare came from what appeared to be a new variant of the Petya ransomware. Leveraging exploits and techniques similar to WannaCry, along with other advanced techniques, to cause damage by sabotaging systems, this latest attack clearly demonstrates how damaging malware can and likely will continue to be to organizations.

    How can you proactively prepare for such threats?

    Watch this webinar to learn how to apply a broader analytics-driven approach to do the fundamentals better, and minimize the risk that your organization will be affected.

    This session will include live demonstrations, and will cover best practices in the following areas:

    • Security fundamentals – the importance of consistent blocking/tackling and security hygiene
    • Posture assessment – establishing end-to-end visibility of potential ransomware activity
    • Investigation, hunting and remediation – IR techniques to verify alerts and hypotheses, and prioritize based on risk
    • Threat intelligence – identifying C2, file hashes and other ransomware IoCs
    • Automation and orchestration – integrating a layered security architecture to drive to faster decisions
    • Leveraging machine learning to detect ransomware patterns and adapt threat models for the latest mutations
  • [Interview] Bloomberg's Caroline Hyde with Splunk CEO Douglas Merritt
    [Interview] Bloomberg's Caroline Hyde with Splunk CEO Douglas Merritt Douglas Merritt, CEO, Splunk Recorded: Oct 9 2017 6 mins
    Splunk President and CEO Douglas Merritt discusses revenues, cloud computing and the company’s focus on cybersecurity. He speaks with Caroline Hyde on “Bloomberg Technology".

Embed in website or blog