Hi [[ session.user.profile.firstName ]]

Splunk Inc.

  • Date
  • Rating
  • Views
  • Splunk 2019 Predictions
    Splunk 2019 Predictions
    Ale Espinosa, Seema Haji, Faya Peng, Jerome Stewart Recorded: May 21 2019 36 mins
    Each year brings bigger and better technology and innovation — 2019 will not be any different. Pulling together insights from our thousands of customer and our dedicated research teams, our experts have assembled a short list of top predictions for 2019.

    Join our Splunk panel of experts for our 2019 Predictions webinar as they discuss what’s in store for 2019 and how you can benefit from the technology and trends poised to transform business in 2019!

    In this webinar, you'll learn about:

    •Artificial Intelligence and Machine Learning as it breaks out of the lab
    •Security in the wake of heightened compliance regulations and evolving digital environments
    •IT Operations as it transforms to focus on application mobility
    •IoT as it claims its stake in the modern organization


    Ale Espinosa
    Sr Director, Security Product Marketing
    Splunk Inc.

    Seema Haji
    Sr Director, IoT Product Marketing
    Splunk Inc.

    Faya Peng
    Sr Director, IT Product Marketing
    Splunk Inc.

    Jerome Stewart
    Sr Director, Platform Product Marketing
    Splunk Inc.
  • Learn Ways to Stay Ahead of Advanced and Insider Threats
    Learn Ways to Stay Ahead of Advanced and Insider Threats
    Kenneth Westin, Girish Bhat, Patriz Regalado Recorded: May 16 2019 56 mins
    Let’s face it – when it comes to advanced threats, security operations teams have no pre-defined indicators to guide them on “what to look for,” leaving them vulnerable to attack. Advanced threats are designed to compromise one or more systems, and establish persistence and communication channels to direct activities to accomplish its goals. Adversaries use multiple attack vectors which are difficult to discover, remove, and attribute.

    The key is to make more informed decisions and pre-empt issues before they occur. The only way to combat and stay ahead of advanced threats is to apply advanced analytics, so you can quickly identify, investigate, respond and adapt to threats in dynamic, digital environments.

    Join us for an overview and demonstration by Splunk Security experts and learn how you can:

    •Benefit from early and timely detection of advanced and insider threats
    •Detect malicious activity within and across the cyber kill chain
    •Detect anomalous activity with advanced statistical analysis and machine learning
    •Gain additional context to investigations by leveraging machine learning
    •Optimize investigations, respond to threats, and increase operational efficiency
    •Leverage 3rd party tools for threat management


    Kenneth Westin
    Staff Security Strategist
    Splunk Inc.

    Girish Bhat
    Director, Product Marketing
    Splunk Inc.

    Patriz Regalado
    Sr Product Marketing Manager
    Splunk Inc.
  • Enabling Real-Time Visibility and Reporting on Compliance Controls
    Enabling Real-Time Visibility and Reporting on Compliance Controls
    Anthony Perez, Director of Field Technology, Splunk Inc. Recorded: May 14 2019 52 mins
    Maintaining visibility into compliance posture with respect to federally-mandated information security controls has historically been a challenging and often time-consuming line of activity across federal agencies, DoD components, and the contractors who support them.

    Watch this free on-demand online training to learn how your agency can establish:

    •Highly scalable monitoring across diverse and geographically-distributed organizations.
    •Unified, vendor-agnostic views across diverse systems, information, and infrastructures.
    •Flexible, near real-time analytics to identify deviations and detect emerging non-compliant activities.
    •A proactive security posture that enables data-driven decision making across the enterprise.
  • Is your SOC SOARing or SNORing
    Is your SOC SOARing or SNORing
    Chris Simmons, Product Marketing, Phantom, Splunk Inc. and Brandon Tansey, Staff Sales Engineer, Phantom, Splunk Inc. Recorded: May 9 2019 58 mins
    How many security alerts can your operations team process daily? Not enough? Many organizations are in the same boat; looking for ways to mature their security operations, and increase the efficiency of skilled security analysts. However, teams that utilize Security Orchestration, Automation & Response (SOAR) platforms are seeing improvements in scale, consistency, and are responding to alerts at machine speed.

    Join this webinar to learn:
    •What the security response process performed by security analysts looks like when employees report phishing attempts
    •What applications and tools a security analyst utilizes to respond
    •What SOAR is and can help you achieve
    •How responses look in comparison when utilizing a SOAR solution
    •Three top tips on getting started to ensure successful automation and orchestration in your organization

    You’ll walk away with an understanding of how to apply lessons learned to your own organization and operate at maximum scale, and maybe how Splunk can help!
  • Real Time IT Monitoring. Your Mission Depends On It
    Real Time IT Monitoring. Your Mission Depends On It
    Ashok Sankar, Phillip Adams, John Israel, Jonathan Fair Recorded: May 8 2019 59 mins
    Whether the mission is citizen service or keeping the country safe, government agencies rely on a complex network of heterogeneous devices, systems, and applications. Maximizing their availability and performance is critical for mission success.

    Watch this on-demand webinar of industry-leading panelists to learn:
    •Insights from teams who are using real-time IT monitoring to mature their operations
    •How to maximize availability and performance of infrastructure that supports mission-critical systems
    •Tips for predicting and preventing to improve the probability of mission success


    Ashok Sankar
    Director, Industry Marketing
    Splunk Inc.

    Phillip Adams
    CTO & Lead Architect
    The National Ignition Facility (NIF) at Lawrence Livermore Laboratory

    John Israel
    Director of Intelligence Operations
    August Schell Enterprise

    Jonathan Fair
    Sr Security Analyst & Splunk SME
    DIOS Tech LLC
  • Four Steps to Transform Your IT Monitoring Mission
    Four Steps to Transform Your IT Monitoring Mission
    Andi Mann, Chief Technology Advocate, Splunk, Inc. and Pankaj Prasad, Sr Principal Analyst, Gartner Recorded: Apr 24 2019 75 mins
    IT Ops teams are now critical to an organization’s success and require a strategy that aligns with the organization’s objectives and its external stakeholders. Most infrastructure monitoring solutions haven’t caught up to meet these new requirements, forcing IT teams to resort to traditional monitoring strategies that don’t allow for innovation and growth.

    Join Gartner analyst Pankaj Prasad and Splunk’s Chief Technology Advocate, Andi Mann, as we discuss new trends in IT monitoring strategy, best practices, and new IT models to implement in your organization.

    Here’s what you’ll learn:
    •How to effectively approach your IT monitoring strategy in this new world of IT
    •Build a successful IT infrastructure operating model to get to market faster, innovate, and respond in real-time
    •Best practices for integrating LOB owners, application developers and external stakeholders into your strategy
  • A Tale of Two SOCs: Regaining Control Using Automation
    A Tale of Two SOCs: Regaining Control Using Automation
    Mauricio Velazco, Chris Decker and Chris Simmons Recorded: Apr 18 2019 55 mins
    Is the volume of inbound security alerts outpacing the investigation and response capacity of your team? If so, you are not alone. Many organizations are looking for ways to bridge their talent gap, work more efficiently, and respond to threats faster.

    Join this recorded panel discussion to hear the journey of two teams who are using the Splunk Phantom security orchestration, automation and response (SOAR) platform to mature their operations.

    You will learn:
    •Security challenges unique to their environment
    •How the Phantom SOAR platform helps
    •Lessons learned during their automation journeys


    Mauricio Velazco
    VP, Threat Management

    Chris Decker
    Enterprise Security Manager
    Penn State University

    Chris Simmons
    Product Marketing, Phantom
    Splunk Inc.
  • 5 Steps to a Predictive IT Strategy to Achieve Mission Success
    5 Steps to a Predictive IT Strategy to Achieve Mission Success
    Bryan Jennewein, Andreia Martins and Retesh Shah Recorded: Apr 16 2019 46 mins
    Countless platforms promise predictive capabilities for your IT organization. What is your strategy for integrating artificial intelligence and machine learning, and what do you need from your tech stack to be successful?

    Watch our webinar with Vodafone and Accenture to understand the 5 critical components to build an effective AI strategy, benefits realized from implementing a predictive IT solution, and what to look for when evaluating predictive analytics solutions.

    What you’ll learn:
    •5 steps to an effective predictive IT strategy
    •How Vodafone with Accenture improved their customer experience with AI
    •Where AI can help, and where it can’t

    Featured Presenters:

    Bryan Jennewein
    Director, Product Marketing
    Splunk Inc.

    Andreia Martins
    Head of IT Operations
    Vodafone UK

    Retesh Shah
    Application Outsourcing Lead for Vodafone
    Accenture UK
  • Security Investigation: Restoring Calm from Chaos
    Security Investigation: Restoring Calm from Chaos
    Jae Lee, Director, Product Marketing, Splunk, Inc. Recorded: Apr 11 2019 66 mins
    Security teams are underfunded, understaffed and overwhelmed by constantly putting out fires. They struggle to deal with threats and attacks, while having to answer hard questions from management. Everyone is demanding detailed, accurate answers about cyberthreats and risk and compliance – and they all need answers NOW.

    So, how useful is it to know that you’re not alone, since others are in the same boat? The answer is “not useful at all.” What IS useful, is knowing how to work smarter and get answers faster.

    Join us in this one-hour technical deep dive and demo to learn:
    •How to analyze events from three common data sources to look for malicious activity
    •How to get more efficient at discovery, triage and the investigation of potential security incidents
    •How to leverage automation methods to accelerate investigations and get answers faster

    This webinar will provide demo examples of how to ask questions of your machine data to get security insights. For example, we will explore whether login behavior looks suspicious the root cause of how an attacker entered your network. We’ll show how you can get to investigative findings quickly and make use of those answers just as quickly. This webinar aims to help security teams learn how to stay focused on solving security problems faster so they can get ahead of it all.
  • Investigate Security Incidents Like a Boss
    Investigate Security Incidents Like a Boss
    Jae Lee, Director, Product Marketing, Splunk Inc. Recorded: Apr 9 2019 53 mins
    For security teams, having the ability to investigate a security incident quickly and accurately is still the most fundamental skill needed to combat the majority of cyberthreats and attacks. The average organization is being attacked on a weekly basis, without the right processes and tools in place to pinpoint root cause without delay, and put the right countermeasures in place in time to minimize damage.

    Join us in this 1-hour webinar to learn:
    •Why investigating security and non-compliance incidents can be so difficult
    •Why machine data generated by your business is so important to security
    •How to get better at performing investigations -- regardless of the size or skill level of your security staff

    We will provide a methodology to help you align how you think about your organization’s security processes – the goal is to help you develop an investigative mindset that addresses a broad range of security and compliance concerns, in a pragmatic and targeted manner, specific to your own needs.

Embed in website or blog