Hi [[ session.user.profile.firstName ]]

Make Troubleshooting Smarter and Collaborative With Intelligence

For decades, your operations center has been trapped by “insights” from the wall of charts. Meanwhile, your operations teams are flooded with alerts that lack context and a problem is emerging. You soon find yourself sitting in war rooms, watching siloed tools, navigating event storms and running scripts to extract “relevant” logs for triage. This just does not scale.

Splunk IT Service Intelligence (ITSI) brings a unique approach to monitoring and troubleshooting with detailed swim lanes, logical drill-downs and meaningful and contextual insights into events.

Watch this webcast to learn how to:

- Speed up investigations by organizing and correlating relevant metrics and events
- Analyze real-time performance in relation to past trends
- Identify and alert on notable events by creating predefined correlation searches
- Navigate through event storms easily and quickly and make informed decisions to focus your attention on what matters
Recorded Apr 12 2017 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
David Millis, Staff Architect of IT Markets, Splunk
Presentation preview: Make Troubleshooting Smarter and Collaborative With Intelligence

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The State of Security Operations: How Prepared Are You For An Attack? Nov 8 2017 1:00 am UTC 60 mins
    Duncan Brown, IDC, Matthias Maier, Splunk, Nathaniel Ford, (ISC)² EMEA
    Cyberattacks are top of mind for organizations across the globe. In fact, 62 percent of firms are being attacked at least weekly and 145 percent are experiencing a rise in the number of security threats. But do organizations have the processes in place to investigate and effectively respond to these incidents? IDC recently surveyed security decision makers at 600 organizations to understand the state of security operations today.

    Join this webinar to hear from guest speaker Duncan Brown, Associate Vice President, Security Practice, IDC, and Matthias Maier, Security Product Marketing Manager, Splunk, and discover:

    ●The time and associated cost security teams spend on incident response and how you compare to your peers

    ●How organizations are coping with an average of 40 actionable security incidents per week

    ●Where teams are focusing their security efforts

    ●Why an analytics-driven approach can make security investigation more efficient and effective, reducing costs and improving security posture
  • Comprehensive Cyber Security & Incident Response: CISCO + Splunk Nov 1 2017 1:00 am UTC 60 mins
    Imran Islam, CISCO, Matthias Maier, Splunk, Adrian Davis, (ISC)² EMEA
    The Cisco Computer Security Incident Response Team (CSIRT) is a global team of information security professionals responsible for the 24/7 monitoring, investigation and incident response at one of the world’s largest and leading technology companies.

    Learn how Imran Islam, leader of Cisco’s EMEA/APAC CSIRT team relies on Splunk to help his team drive best practices in threat assessment, mitigation planning, incident detection and response, incident trend analysis, and the development of future security architecture.

    Join this webinar to hear Imran Islam discuss how Cisco drives CSIRT best practices:

    - CSIRT playbooks and automation methods

    - The importance of timely CSIRT data access, correlation & visualisation

    - CSIRT staffing approaches

    - CSIRT threat intelligence management

    - Driving CSIRT operational efficiency

    - The importance of CSIRT collaboration across the business during investigations

    - How CSIRT functions can increase business relevance

    - Learn about the importance of understanding your environment

    - Learn about the importance of having the right data

    - Learn the critical success factors for building a CSIRT Team and capabilities

    - Learn how to enable your security team to scale its ability to handle incidents and quickly find, validate, and resolve issues

    - Learn how to justify adding more resources to an incident response team

    - Learn how to introduce consistency into your security team for approaching and solving security problems.
  • A Day in the Life of a GDPR Breach Oct 25 2017 12:00 am UTC 60 mins
    Splunk’s Data Privacy Officer, Elizabeth Davies and Splunk’s Security Ninja, Matthias Maier
    You’re a CIO, CISO or DPO - and you’ve been woken up in the middle of
    the night because personal data held by your organization has been
    discovered for sale on the dark web. This disclosure puts the privacy of
    your customers at risk. What do you do next?
    Join this session to learn about the impact of GDPR and go through a
    breach investigation and response scenario as it would be after GDPR
    comes into effect in May 2018. You’ll hear from Splunk’s Data Privacy
    Officer Elizabeth Davies and Splunk’s Security Ninja Matthias Maier.

    What you'll learn:
    ● What breach response will look like under the GDPR
    ● What tools and processes a data privacy officer will rely on in
    case of a breach
    ● What departments and entities will be involved beyond IT
    ● What activities are currently happening within organizations to
    prepare for the GDPR
    ● What the consequences of the breach could be
  • Detection of Ransomware and Prevention Strategies Oct 18 2017 12:00 am UTC 60 mins
    James Brodsky, Sr. Security SME, Splunk
    Ransomware has moved from a nuisance targeting consumers to a serious threat to businesses and government agencies.

    In this session you will learn more about what ransomware is and how it works, followed by a live Splunk demonstration with data from a Windows ransomware infection.

    You will learn:

    - How to use Splunk Enterprise to hunt for ransomware IOCs
    - How to detect malicious endpoint behavior
    - Strategies for prevention
  • How to Stay Ahead of Today's Ransomware Realities Oct 11 2017 12:00 am UTC 75 mins
    Ken Westin, Security Specialist, Splunk
    The recent ransomware outbreaks have destabilized business operations around the world.

    The most recent ransomware scare came from what appeared to be a new variant of the Petya ransomware. Leveraging exploits and techniques similar to WannaCry, along with other advanced techniques, to cause damage by sabotaging systems, this latest attack clearly demonstrates how damaging malware can and likely will continue to be to organizations.

    How can you proactively prepare for such threats?

    Watch this webinar to learn how to apply a broader analytics-driven approach to do the fundamentals better, and minimize the risk that your organization will be affected.

    This session will include live demonstrations, and will cover best practices in the following areas:

    • Security fundamentals – the importance of consistent blocking/tackling and security hygiene
    • Posture assessment – establishing end-to-end visibility of potential ransomware activity
    • Investigation, hunting and remediation – IR techniques to verify alerts and hypotheses, and prioritize based on risk
    • Threat intelligence – identifying C2, file hashes and other ransomware IoCs
    • Automation and orchestration – integrating a layered security architecture to drive to faster decisions
    • Leveraging machine learning to detect ransomware patterns and adapt threat models for the latest mutations
  • [Interview] Bloomberg's Caroline Hyde with Splunk CEO Douglas Merritt Oct 9 2017 12:00 am UTC 15 mins
    Douglas Merritt, CEO, Splunk
    Splunk President and CEO Douglas Merritt discusses revenues, cloud computing and the company’s focus on cybersecurity. He speaks with Caroline Hyde on “Bloomberg Technology".
  • Splunk & Gartner: Use an Analytics-Driven SIEM for Targeted Attack Oct 3 2017 12:00 am UTC 60 mins
    Girish Bhat, Director, Security Product Marketing, Splunk & Kelly Kavanaugh, Analyst, Info. Security & Privacy, Gartner
    It's no longer a question whether an organization will be breached -- it's a matter of when. According to Gartner, organizations are failing at early breach detection, with fewer than 20% of breaches detected internally.* The time to detect a compromise can takes days, or even months.

    Join this webinar to hear Splunk and Gartner discuss the strategic role of SIEM as a centralized solution and why organizations need to move from prevention only solutions to detection, response and remediation.

    In this session, Gartner research analyst Kelly Kavanagh will address:
    - Challenges facing organizations when it comes to advanced threats
    - The resources and technologies needed
    - Best practices on how organizations can leverage SIEM and lean-forward technologies like user and entity behavior analytics

    Speakers:
    Kelly Kavanagh, Prinicipal Research Analyst, Security & Risk at Gartner
    Girish Bhat, Security Product Marketing at Splunk
  • Investigation or Exasperation? The State of Security Operations Recorded: Sep 21 2017 45 mins
    Duncan Brown, Associate Vice President, Security Practice, IDC & Jae Lee, Security Product Marketing, Splunk
    Cyberattacks are top of mind for organizations across the globe. In fact, 62 percent* of firms are being attacked at least weekly and 145 percent are experiencing a rise in the number of security threats. But do organizations have the processes in place to investigate and effectively respond to these incidents? IDC recently surveyed security decision makers at 600 organizations to understand the state of security operations today.

    Join this webinar to hear from guest speaker Duncan Brown, associate vice president, security practice, IDC, and Jae Lee, security product marketing, Splunk, and discover:

    ● The time and associated cost security teams spend on incident response and how you compare to your peers
    ● How organizations are coping with an average of 40 actionable security incidents per week
    ● Where teams are focusing their security efforts
    ● Why an analytics-driven approach can make security investigation more efficient and effective, reducing costs and improving security posture
  • Don’t Let Your Legacy SIEM Be Your Kryptonite Recorded: Sep 5 2017 59 mins
    Girish Bhat, Director of Security Product Marketing at Splunk ; Risi Avila, Security Professional Services Consultant at Splu
    It’s a bird, it’s a plane, no it’s just your legacy SIEM. Did you know your SIEM might be weakening your security powers? Your legacy SIEM could be:

    • Limiting your ability to collect, store and use security-relevant unstructured and structured data
    • Making it difficult to maintain your SIEM and requiring skilled staff to work around the clock just to keep the lights on
    • Burdening your security operations team by forcing them to chase false alarms while missing critical alerts
    • Failing to detect modern threats and putting your entire business at risk

    But have no fear, Splunk’s security experts are here to make you a security super hero again. Put on your cape and join us for this webinar to learn how Splunk can be used as a modern SIEM to solve a range of security use cases and more.

    Splunk’s security experts will share common SIEM replacement and migration scenarios and discuss how a department store, a financial services firm and a luxury retailer successfully migrated from their legacy SIEM to Splunk.
  • The Reviews Are In—How Yelp Uses Machine Data to Improve Its Customer Experience Recorded: Aug 31 2017 58 mins
    Kris Wehner, VP, Engineering, Yelp; Charles Guenther, Site Reliability Engineering, Yelp; Keegan Dubbs, Splunk
    Yelp, the platform that connects millions with business reviews and reservations, needed a way to make over 10+ terabytes of data accessible and usable to everyone within the company. It also needed to monitor the workloads that span both on-premises and cloud systems, across a variety of stacks.

    Join this webinar to learn how Yelp uses the Splunk platform to proactively notify on issues with the web, and save engineering hours by empowering users with access to data. In this session, you’ll hear how the company:

    • Improved website uptime with real-time notifications
    • Quickly and reliably delivers application features to users
    • Uncovers business insights and improves the customer experience

    If you're already running workloads in the cloud, or in the process of migrating, this is a great opportunity to learn how you can gain additional visibility into your cloud strategy.
  • Splunk & Gartner: Use an Analytics-Driven SIEM for Targeted Attack Detection Recorded: Aug 29 2017 62 mins
    Girish Bhat, Director, Security Product Marketing, Splunk & Kelly Kavanaugh, Analyst, Info. Security & Privacy, Gartner
    It's no longer a question whether an organization will be breached -- it's a matter of when. According to Gartner, organizations are failing at early breach detection, with fewer than 20% of breaches detected internally.* The time to detect a compromise can takes days, or even months.

    Join this webinar to hear Splunk and Gartner discuss the strategic role of SIEM as a centralized solution and why organizations need to move from prevention only solutions to detection, response and remediation.

    In this session, Gartner research analyst Kelly Kavanagh will address:
    - Challenges facing organizations when it comes to advanced threats
    - The resources and technologies needed
    - Best practices on how organizations can leverage SIEM and lean-forward technologies like user and entity behavior analytics

    Speakers:
    Kelly Kavanagh, Prinicipal Research Analyst, Security & Risk at Gartner
    Girish Bhat, Security Product Marketing at Splunk
  • Learn How Equinix Uses Splunk as a Cloud-Based SIEM Recorded: Aug 24 2017 62 mins
    George Do, CISO at Equinix; Girish Bhat, Director of Security Product Marketing at Splunk
    Security teams are tasked with minimizing risk and safeguarding the business while dealing with increasingly complex threats. In addition, they must have the flexibility to monitor across diverse infrastructure. Cloud-based SIEM enables security teams to spend precious time and energy on mitigating security risks rather than on deploying and managing infrastructure.

    Join this webinar to hear from George Do, CISO at Equinix, about how cloud-based SIEM, with Splunk Enterprise Security running on Splunk Cloud, delivers instant access to advanced security analytics, valuable context and detailed insights.

    You will also learn how Splunk Enterprise Security running on Splunk Cloud can:

    •Enable you to improve threat identification and risk mitigation
    •Reduce remediation cycle times
    •Demonstrate regulatory compliance
    •Scale your SIEM deployment while reducing TCO by 50 percent compared to legacy solutions
  • How to Stay Ahead of Today's Ransomware Realities Recorded: Aug 22 2017 76 mins
    Ken Westin, Security Specialist, Splunk
    The recent ransomware outbreaks have destabilized business operations around the world.

    The most recent ransomware scare came from what appeared to be a new variant of the Petya ransomware. Leveraging exploits and techniques similar to WannaCry, along with other advanced techniques, to cause damage by sabotaging systems, this latest attack clearly demonstrates how damaging malware can and likely will continue to be to organizations.

    How can you proactively prepare for such threats?

    Watch this webinar to learn how to apply a broader analytics-driven approach to do the fundamentals better, and minimize the risk that your organization will be affected.

    This session will include live demonstrations, and will cover best practices in the following areas:

    • Security fundamentals – the importance of consistent blocking/tackling and security hygiene
    • Posture assessment – establishing end-to-end visibility of potential ransomware activity
    • Investigation, hunting and remediation – IR techniques to verify alerts and hypotheses, and prioritize based on risk
    • Threat intelligence – identifying C2, file hashes and other ransomware IoCs
    • Automation and orchestration – integrating a layered security architecture to drive to faster decisions
    • Leveraging machine learning to detect ransomware patterns and adapt threat models for the latest mutations
  • Find What's Broken Fast With Splunk ITSI and Event Analytics Recorded: Aug 16 2017 62 mins
    Priya Balakrishnan, Director, Solutions Marketing at Splunk; Alok Bhide, Director, Product Management at Splunk
    The problem with data centers is that they generate a lot of events – from low-level disk warnings to critical network issues to service-level failures. While you can create manual rules to filter out some of the noise, this often isn’t enough. How do you navigate this flood of events and prioritize the ones that truly matter? How do you relate these critical events to the same core issue, and ensure everyone has the same understanding of the impacted service, relative priority and likely root cause?

    Watch this webinar to learn how you can use Splunk IT Service Intelligence and machine learning to:

    - Monitor real-time data and be alerted when an anomaly occurs
    - Automatically correlate data to generate highly qualified information, so you can take fast action
    - Enable users to investigate with context, priority and importance, so they are empowered to take actions faster
  • How a Lean IT Shop Detects Threats while Delivering Reliable IT Services Recorded: Aug 15 2017 41 mins
    Gregg Daly, Principal Engineer, Children's Discovery Museum of San Jose
    Most organizations continue to struggle when balancing tradeoffs between enabling IT services -- at low cost and low overhead -- versus staying ahead of modern threats.

    Children’s Discovery Museum of San Jose (CDM) needed to deliver quality educational experiences, while protecting their messaging platform from spear phishing attempts and emerging ransomware mutations -- in a highly scrutinized, budget-restricted environment.

    Watch this webinar to learn how CDM is using Splunk software to realize the benefits of a sound data strategy resulting in faster, better analytics-driven decisions. CDM has been able to address security, manageability and a variety of operational IT challenges.

    In this session, learn how CDM prepares for persistent and emerging malware threats, such as ransomware, via an adaptive approach, and by applying techniques such as:

    - Identifying, classifying and automatically blocking statistically-identified threats
    - Using primary network data as a key data source within their messaging system
    - Leveraging active data pipelines and autonomous, active counter-measures
    - Testing for relevance to stay ahead of evolving attack methods
  • Aflac Protects You. See Who Protects Them. Recorded: Aug 9 2017 65 mins
    DJ Goldsworthy, Director of Security Operations and Threat Management at Aflac
    In 2016, Aflac, a Fortune 500 company providing financial protection to more than 50 million people worldwide, embarked on a mission to build a custom threat intelligence system in response to the rapid increase in security threats targeting its network of 15,000 worldwide employees.

    Join this webinar to hear from DJ Goldsworthy, director of Security Operations and Threat Management at Aflac, about how Aflac deployed Splunk Enterprise Security at the heart of its internal Threat Intelligence System and augmented it with Splunk User Behavior Analytics to:

    • Automate threat hunting and 90 percent of its security metrics process in just two months
    • Replace a legacy SIEM and determine risk for automated remediation
    • Identify insider threats and rapidly investigate threats
    • Block more than 2 million connections with less than 12 false positives

    Girish Bhat, director of Security Product Marketing at Splunk, will share examples of Splunk customers that are to solving a wide range of security analytics use cases: Rapid Incident Detection and Investigation, Ransomware, External Attacks, Cyber Command Center and more.
  • [CASE STUDY] How Yelp Uses Machine Data to Improve Its Customer Experience Recorded: Jun 16 2017 58 mins
    Kris Wehner, Vice President Engineering, Yelp & Charles Guenther, Site Reliability Engineering, Yelp
    Yelp, the platform that connects millions with business reviews and reservations, needed a way to make over 10+ terabytes of data accessible and usable to everyone within the company. It also needed to monitor the workloads that span both on-premises and cloud systems, across a variety of stacks.

    Join this webinar to learn how Yelp uses the Splunk platform to proactively notify on issues with the web, and save engineering hours by empowering users with access to data.

    In this session, you’ll hear how the company:
    • Improved website uptime with real-time notifications
    • Quickly and reliably delivers application features to users
    • Uncovers business insights and improves the customer experience

    If you're already running workloads in the cloud, or in the process of migrating, this is a great opportunity to learn how you can gain additional visibility into your cloud strategy.
  • [Product demo] Splunk Everywhere! Ransomware Recorded: Jun 12 2017 2 mins
    Haiyan Song, Senior Vice President, Splunk Security Markets
    Ransomware has recently gained enough mainstream momentum to now be considered life or death, affecting key infrastructures. Find out how Splunk's real-time analytics-based approach to security allows IT and security to work together to be adaptive and respond to ransomware attacks at machine speed.
  • [Interview] Bloomberg's Caroline Hyde with Splunk CEO Douglas Merritt Recorded: May 25 2017 6 mins
    Douglas Merritt, CEO, Splunk
    Splunk President and CEO Douglas Merritt discusses revenues, cloud computing and the company’s focus on cybersecurity. He speaks with Caroline Hyde on “Bloomberg Technology".
  • 3 Ways to Build a Data-Driven Business Recorded: May 10 2017 55 mins
    Snehal Antani, CTO, Splunk Inc.
    This video, presented by Splunk's CTO Snehal Antani, discusses how data is leveraged to solve critical problems, improve efficiencies, and optimize security in real time. Attend to learn:

    • How to successfully implement a data-focused approach to ensuring cybersecurity across departments
    • How to reduce organizational risk, while balancing emerging digital trends and directions that are catalysts for disruption
    • How continuous insights brings data to the fingertips of key stakeholders, shifting the culture from being reactive to proactive
Splunk Webinars and Videos
Splunk Inc. (NASDAQ: SPLK) is the market leader in analyzing machine data to deliver Operational Intelligence for security, IT and the business. Splunk® software provides the enterprise machine data fabric that drives digital transformation. More than 13,000 customers in over 110 countries use Splunk solutions in the cloud and on-premises.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Make Troubleshooting Smarter and Collaborative With Intelligence
  • Live at: Apr 12 2017 10:40 pm
  • Presented by: David Millis, Staff Architect of IT Markets, Splunk
  • From:
Your email has been sent.
or close