Hi [[ session.user.profile.firstName ]]

Splunk EMEA

  • Date
  • Rating
  • Views
  • A Day in the Life of a GDPR Breach
    A Day in the Life of a GDPR Breach Adrian, Davis, (ISC)², EMEA, Matthias, Maier, Elizabeth Recorded: Oct 4 2017 62 mins
    You’re a CIO, CISO or DPO - and you’ve been woken up in the middle of
    the night because personal data held by your organization has been
    discovered for sale on the dark web. This disclosure puts the privacy of
    your customers at risk. What do you do next?
    Join this session to learn about the impact of GDPR and go through a
    breach investigation and response scenario as it would be after GDPR
    comes into effect in May 2018. You’ll hear from Splunk’s Data Privacy
    Officer Elizabeth Davies and Splunk’s Security Ninja Matthias Maier.

    What you'll learn:
    ● What breach response will look like under the GDPR
    ● What tools and processes a data privacy officer will rely on in
    case of a breach
    ● What departments and entities will be involved beyond IT
    ● What activities are currently happening within organizations to
    prepare for the GDPR
    ● What the consequences of the breach could be
  • Comprehensive Cyber Security & Incident Response: CISCO + Splunk
    Comprehensive Cyber Security & Incident Response: CISCO + Splunk Imran Islam, CISCO, Matthias Maier, Splunk, Adrian Davis, (ISC)² EMEA Recorded: Sep 13 2017 59 mins
    The Cisco Computer Security Incident Response Team (CSIRT) is a global team of information security professionals responsible for the 24/7 monitoring, investigation and incident response at one of the world’s largest and leading technology companies.

    Learn how Imran Islam, leader of Cisco’s EMEA/APAC CSIRT team relies on Splunk to help his team drive best practices in threat assessment, mitigation planning, incident detection and response, incident trend analysis, and the development of future security architecture.

    Join this webinar to hear Imran Islam discuss how Cisco drives CSIRT best practices:

    - CSIRT playbooks and automation methods

    - The importance of timely CSIRT data access, correlation & visualisation

    - CSIRT staffing approaches

    - CSIRT threat intelligence management

    - Driving CSIRT operational efficiency

    - The importance of CSIRT collaboration across the business during investigations

    - How CSIRT functions can increase business relevance

    - Learn about the importance of understanding your environment

    - Learn about the importance of having the right data

    - Learn the critical success factors for building a CSIRT Team and capabilities

    - Learn how to enable your security team to scale its ability to handle incidents and quickly find, validate, and resolve issues

    - Learn how to justify adding more resources to an incident response team

    - Learn how to introduce consistency into your security team for approaching and solving security problems.
  • The State of Security Operations: How Prepared Are You For An Attack?
    The State of Security Operations: How Prepared Are You For An Attack? Duncan Brown, IDC, Matthias Maier, Splunk, Nathaniel Ford, (ISC)² EMEA Recorded: Aug 23 2017 58 mins
    Cyberattacks are top of mind for organizations across the globe. In fact, 62 percent of firms are being attacked at least weekly and 145 percent are experiencing a rise in the number of security threats. But do organizations have the processes in place to investigate and effectively respond to these incidents? IDC recently surveyed security decision makers at 600 organizations to understand the state of security operations today.

    Join this webinar to hear from guest speaker Duncan Brown, Associate Vice President, Security Practice, IDC, and Matthias Maier, Security Product Marketing Manager, Splunk, and discover:

    ●The time and associated cost security teams spend on incident response and how you compare to your peers

    ●How organizations are coping with an average of 40 actionable security incidents per week

    ●Where teams are focusing their security efforts

    ●Why an analytics-driven approach can make security investigation more efficient and effective, reducing costs and improving security posture
  • Splunk and Gartner: Use an Analytics-Driven SIEM for Targeted Attack Detection
    Splunk and Gartner: Use an Analytics-Driven SIEM for Targeted Attack Detection Girish Bhat, Splunk Director of Security Product Marketing; Kelly Kavanaugh, Research Analyst,Info Security & Privacy,Gartner Recorded: Jun 7 2017 62 mins
    Description : It's no longer a question whether an organization will be breached -- it's a matter of when. According to Gartner, organizations are failing at early breach detection, with fewer than 20% of breaches detected internally.* The time to detect a compromise can takes days, or even months.

    Join this webinar to hear Splunk and Gartner discuss the strategic role of SIEM as a centralized solution and why organizations need to move from prevention only solutions to detection, response and remediation.

    In this session, Gartner research analyst Kelly Kavanagh will address:
    - Challenges facing organizations when it comes to advanced threats
    - The resources and technologies needed
    - Best practices on how organizations can leverage SIEM and lean-forward technologies like user and entity behavior analytics
  • [ANALYST VIDEO] Investigation or Exasperation? The State of Security Operations
    [ANALYST VIDEO] Investigation or Exasperation? The State of Security Operations Duncan Brown, Associate Vice President, European Security Practice, IDC Recorded: Jun 1 2017 3 mins
    Cyberattacks are top of mind for organizations across the globe. In fact, 62 percent of firms are being attacked at least weekly and 45 percent are experiencing a rise in the number of security threats. But do organizations have the processes in place to investigate and effectively respond to these incidents? IDC recently surveyed security decision makers at 600 organizations to understand the state of security operations today.
  • WannaCry Ransomware Attack: Splunk Briefing and Demo
    WannaCry Ransomware Attack: Splunk Briefing and Demo Angelo Brancato & Kai-Ping Seidenschnur Recorded: May 31 2017 60 mins
    From national health agencies to public transportation infrastructure, the recent WannaCry ransomware attack has upended organizations around the world. Although a security issue, the fast propagation and business-impacting nature of the attack shows that ransomware is a greater concern that affects all of IT.

    How can you better prepare and respond to such threats?
    Watch this ondemand webinar to learn how to apply a broader analytical approach and data-driven techniques to quickly pinpoint the source of an attack and determine the appropriate remediation steps.

    Hear from Splunk’s EMEA Security Specialists Angelo Brancato & Kai-Ping Seidenschnur to learn:
    - How to gain end-to-end visibility of potential ransomware infections
    - How to quickly verify an infection and accurately identify the method and source of infection
    - Strategies to ensure continuity of operations during an attack
    - Remediation guidance on how to prevent similar infections
    - Best practices to immediately improve your security posture using Splunk
  • [Case study] How Illumina Detects Advanced Malware and Threats
    [Case study] How Illumina Detects Advanced Malware and Threats Ryan Niemes Sr. Staff Information Security Analyst Illumina Recorded: May 9 2017 62 mins
    Illumina, a leader in genetic sequencing, needed a security solution to provide visibility into all its data and to accelerate the detection of advanced malware, and investigate and hunt threats.

    Join this webinar to hear how Illumina uses Splunk’s Enterprise Security as a SIEM and security intelligence platform to:

    • Gain visibility across all data sources
    • Detect patient-zero malware
    • Rapidly respond to incidents
    • Accelerate time to detect using the threat intelligence framework
    • Hunt for threats

    Splunk will discuss the key capabilities in a modern SIEM solution and how you can use Splunk Enterprise Security to implement a SIEM, and to replace or augment legacy SIEMs and analytics solutions
  • [Product overview] How to Use Splunk ES for Analytics-Driven SIEM?
    [Product overview] How to Use Splunk ES for Analytics-Driven SIEM? Girish Bhat, director of security product marketing at Splunk Chris Shobert, senior sales engineer at Splunk Recorded: May 9 2017 60 mins
    Splunk Enterprise Security (ES) is an analytics-driven SIEM that powers successful security operations teams. But did you know it is actually made up of distinct frameworks that can each be leveraged independently to meet specific security use cases?

    Join us to learn the technical details behind key ES frameworks including: asset and identity correlation, notable event, threat intelligence, risk analysis, investigation and adaptive response. Splunk experts will discuss real-world examples and demo the key frameworks, which will help you to solve your security challenges
  • Don’t Let Your Legacy SIEM Be Your Kryptonite
    Don’t Let Your Legacy SIEM Be Your Kryptonite Girish Bhat, Splunk Director of Security Product Marketing; Risi Avila, Security Professional Services Consultant Recorded: May 9 2017 58 mins
    It’s a bird, it’s a plane, no it’s just your legacy SIEM. Did you know your SIEM might be weakening your security powers? Your legacy SIEM could be:
    • Limiting your ability to collect, store and use security-relevant unstructured and structured data
    • Making it difficult to maintain your SIEM and requiring skilled staff to work around the clock just to keep the lights on
    • Burdening your security operations team by forcing them to chase false alarms while missing critical alerts
    • Failing to detect modern threats and putting your entire business at risk
  • [Product demo] How to Detect and Prevent Ransomware with Splunk
    [Product demo] How to Detect and Prevent Ransomware with Splunk James Brodsky, Sr. Security SME, Splunk Recorded: May 9 2017 63 mins
    Ransomware has moved from a nuisance targeting consumers to a serious threat to businesses and government agencies.

    In this session you will learn more about what ransomware is and how it works, followed by a live Splunk demonstration with data from a Windows ransomware infection.

    You will learn:
    - How to use Splunk Enterprise to hunt for ransomware IOCs
    - How to detect malicious endpoint behavior
    - Strategies for prevention

Embed in website or blog