Hi [[ session.user.profile.firstName ]]

Splunk EMEA

  • Date
  • Rating
  • Views
  • How to Create a Winning Cybersecurity Strategy
    How to Create a Winning Cybersecurity Strategy
    Raef Meeuwisse (ISACA Speaker & Author) | Slavik Markovich (Demisto) | Matthias Maier (Splunk) | Luke Potter (SureCloud) Recorded: Jun 7 2018 55 mins
    Cyber attacks on businesses, organizations and critical infrastructure becoming the norm in 2018. Massive breaches are constantly in the news and consumers are demanding stricter data and privacy protections. Cybersecurity has never been more important to organizations, and the investment in security technology has never been greater.

    CISOs are in the spotlight, and are looking to build the best strategy to secure their organizations, customers and users.

    Join top security experts for an interactive Q&A panel discussion on:
    - The key factors CISOs should consider for their cybersecurity strategy
    - The current and future threatscape
    - Technological solutions that make CISOs' lives easier
    - How organizations are coping with the shortage of qualified security workforce
    - How CISOs can better communicate their strategy to the board

    Speakers:
    - Raef Meeuwisse, ISACA Expert Speaker & author Cybersecurity for Beginners
    - Slavik Markovich, Founder & CEO, Demisto
    - Matthias Maier, Product Marketing Director & Security Evangelist, Splunk
    - Luke Potter, Cybersecurity Practice Director, SureCloud

    The session will be streamed LIVE from London from the Infosecurity Europe conference.
  • Cloud Migration: How to Weather The Data Storm
    Cloud Migration: How to Weather The Data Storm
    James Hodge, AVP Field Technology, EMEA, and Paul Davies, Senior EMEA Alliances Sales Engineer, Splunk Recorded: May 10 2018 12 mins
    Join this 10 minute live Q&A with Splunk cloud migration experts as they discuss how organisations are cutting through the fog to gain visibility into their cloud environments for monitoring usage, security, compliance and keeping control of costs.

    High visibility, low pressure.
  • Next-Generation Cloud Monitoring for AWS Workloads
    Next-Generation Cloud Monitoring for AWS Workloads
    Simon Ratcliffe, Andrew Bird, James Hodge and Benjamin Andrew Recorded: May 10 2018 37 mins
    Join this live panel discussion with experts from Splunk and AWS Marketplace to learn the latest trends and best practices for better cloud monitoring.

    Tune into this interactive Q&A session to hear from Cloud and Storage experts on:

    - How to ensure adherence to security and compliance standards
    - How to manage AWS costs
    - The benefits of analytics and visibility for your AWS workloads
    - Why moving mission-critical workloads to AWS improves agility
    - The latest updates from Splunk and AWS Marketplace on industry trends

    This session will be broadcast LIVE straight from the AWS Summit in London.

    Moderator: Simon Ratcliffe, Principal Consultant, Ensono & Cloud Industry Forum Chair
    Panelists: James Hodge, AVP Field Technology, Splunk, Andrew Bird, Chief Digital Officer, Oryzus Consulting, and Benjamin Andrew, Global Lead - Security & Network Infrastructure, AWS Marketplace
  • A Day in the Life of a GDPR Breach
    A Day in the Life of a GDPR Breach
    Adrian, Davis, (ISC)², EMEA, Matthias, Maier, Elizabeth Recorded: Oct 4 2017 62 mins
    You’re a CIO, CISO or DPO - and you’ve been woken up in the middle of
    the night because personal data held by your organization has been
    discovered for sale on the dark web. This disclosure puts the privacy of
    your customers at risk. What do you do next?
    Join this session to learn about the impact of GDPR and go through a
    breach investigation and response scenario as it would be after GDPR
    comes into effect in May 2018. You’ll hear from Splunk’s Data Privacy
    Officer Elizabeth Davies and Splunk’s Security Ninja Matthias Maier.

    What you'll learn:
    ● What breach response will look like under the GDPR
    ● What tools and processes a data privacy officer will rely on in
    case of a breach
    ● What departments and entities will be involved beyond IT
    ● What activities are currently happening within organizations to
    prepare for the GDPR
    ● What the consequences of the breach could be
  • Comprehensive Cyber Security & Incident Response: CISCO + Splunk
    Comprehensive Cyber Security & Incident Response: CISCO + Splunk
    Imran Islam, CISCO, Matthias Maier, Splunk, Adrian Davis, (ISC)² EMEA Recorded: Sep 13 2017 59 mins
    The Cisco Computer Security Incident Response Team (CSIRT) is a global team of information security professionals responsible for the 24/7 monitoring, investigation and incident response at one of the world’s largest and leading technology companies.

    Learn how Imran Islam, leader of Cisco’s EMEA/APAC CSIRT team relies on Splunk to help his team drive best practices in threat assessment, mitigation planning, incident detection and response, incident trend analysis, and the development of future security architecture.

    Join this webinar to hear Imran Islam discuss how Cisco drives CSIRT best practices:

    - CSIRT playbooks and automation methods

    - The importance of timely CSIRT data access, correlation & visualisation

    - CSIRT staffing approaches

    - CSIRT threat intelligence management

    - Driving CSIRT operational efficiency

    - The importance of CSIRT collaboration across the business during investigations

    - How CSIRT functions can increase business relevance

    - Learn about the importance of understanding your environment

    - Learn about the importance of having the right data

    - Learn the critical success factors for building a CSIRT Team and capabilities

    - Learn how to enable your security team to scale its ability to handle incidents and quickly find, validate, and resolve issues

    - Learn how to justify adding more resources to an incident response team

    - Learn how to introduce consistency into your security team for approaching and solving security problems.
  • The State of Security Operations: How Prepared Are You For An Attack?
    The State of Security Operations: How Prepared Are You For An Attack?
    Duncan Brown, IDC, Matthias Maier, Splunk, Nathaniel Ford, (ISC)² EMEA Recorded: Aug 23 2017 58 mins
    Cyberattacks are top of mind for organizations across the globe. In fact, 62 percent of firms are being attacked at least weekly and 145 percent are experiencing a rise in the number of security threats. But do organizations have the processes in place to investigate and effectively respond to these incidents? IDC recently surveyed security decision makers at 600 organizations to understand the state of security operations today.

    Join this webinar to hear from guest speaker Duncan Brown, Associate Vice President, Security Practice, IDC, and Matthias Maier, Security Product Marketing Manager, Splunk, and discover:

    ●The time and associated cost security teams spend on incident response and how you compare to your peers

    ●How organizations are coping with an average of 40 actionable security incidents per week

    ●Where teams are focusing their security efforts

    ●Why an analytics-driven approach can make security investigation more efficient and effective, reducing costs and improving security posture
  • Splunk and Gartner: Use an Analytics-Driven SIEM for Targeted Attack Detection
    Splunk and Gartner: Use an Analytics-Driven SIEM for Targeted Attack Detection
    Girish Bhat, Splunk Director of Security Product Marketing; Kelly Kavanaugh, Research Analyst,Info Security & Privacy,Gartner Recorded: Jun 7 2017 62 mins
    Description : It's no longer a question whether an organization will be breached -- it's a matter of when. According to Gartner, organizations are failing at early breach detection, with fewer than 20% of breaches detected internally.* The time to detect a compromise can takes days, or even months.

    Join this webinar to hear Splunk and Gartner discuss the strategic role of SIEM as a centralized solution and why organizations need to move from prevention only solutions to detection, response and remediation.

    In this session, Gartner research analyst Kelly Kavanagh will address:
    - Challenges facing organizations when it comes to advanced threats
    - The resources and technologies needed
    - Best practices on how organizations can leverage SIEM and lean-forward technologies like user and entity behavior analytics
  • [ANALYST VIDEO] Investigation or Exasperation? The State of Security Operations
    [ANALYST VIDEO] Investigation or Exasperation? The State of Security Operations
    Duncan Brown, Associate Vice President, European Security Practice, IDC Recorded: Jun 1 2017 3 mins
    Cyberattacks are top of mind for organizations across the globe. In fact, 62 percent of firms are being attacked at least weekly and 45 percent are experiencing a rise in the number of security threats. But do organizations have the processes in place to investigate and effectively respond to these incidents? IDC recently surveyed security decision makers at 600 organizations to understand the state of security operations today.
  • WannaCry Ransomware Attack: Splunk Briefing and Demo
    WannaCry Ransomware Attack: Splunk Briefing and Demo
    Angelo Brancato & Kai-Ping Seidenschnur Recorded: May 31 2017 60 mins
    From national health agencies to public transportation infrastructure, the recent WannaCry ransomware attack has upended organizations around the world. Although a security issue, the fast propagation and business-impacting nature of the attack shows that ransomware is a greater concern that affects all of IT.

    How can you better prepare and respond to such threats?
    Watch this ondemand webinar to learn how to apply a broader analytical approach and data-driven techniques to quickly pinpoint the source of an attack and determine the appropriate remediation steps.

    Hear from Splunk’s EMEA Security Specialists Angelo Brancato & Kai-Ping Seidenschnur to learn:
    - How to gain end-to-end visibility of potential ransomware infections
    - How to quickly verify an infection and accurately identify the method and source of infection
    - Strategies to ensure continuity of operations during an attack
    - Remediation guidance on how to prevent similar infections
    - Best practices to immediately improve your security posture using Splunk
  • [Case study] How Illumina Detects Advanced Malware and Threats
    [Case study] How Illumina Detects Advanced Malware and Threats
    Ryan Niemes Sr. Staff Information Security Analyst Illumina Recorded: May 9 2017 62 mins
    Illumina, a leader in genetic sequencing, needed a security solution to provide visibility into all its data and to accelerate the detection of advanced malware, and investigate and hunt threats.

    Join this webinar to hear how Illumina uses Splunk’s Enterprise Security as a SIEM and security intelligence platform to:

    • Gain visibility across all data sources
    • Detect patient-zero malware
    • Rapidly respond to incidents
    • Accelerate time to detect using the threat intelligence framework
    • Hunt for threats

    Splunk will discuss the key capabilities in a modern SIEM solution and how you can use Splunk Enterprise Security to implement a SIEM, and to replace or augment legacy SIEMs and analytics solutions

Embed in website or blog