Fight Fraud with Data: How States Can Confront Unemployment Insurance (UI) Abuse
Unemployment claims skyrocketed over the past year, as millions of Americans lost their jobs during the pandemic. Sadly, as the number of claims rose, so did instances of unemployment insurance benefits fraud. These cases have resulted in billions of dollars lost. In California alone, officials reported more than $11 billion in improper payments in the first nine months of the pandemic. And these fraudulent claims aren’t just costly – they add complications and delays to already-overwhelmed state benefits systems that ultimately affect regular citizens who are out of work. Each state provides a critical lifeline for individuals and it's incredibly important that these systems perform well and detect fraudulent activity immediately.
How can states fight fraud? With better access to data. More comprehensive information on identity and behavior will help stem the tide of fraudulent claims.
Join us for an in-depth discussion on how states can get a handle on waste, fraud and abuse in your unemployment insurance benefits program. Our panel of public officials and industry leaders will cover a range of topics, including:
· How unemployment insurance benefits fraud has impacted states during the pandemic
· How better access to data can help address gaps in state unemployment systems
· How your state can build on and mature its fraud strategy
RecordedSep 29 202161 mins
Your place is confirmed, we'll send you email reminders
Dimitri McKay | Principal Security Specialist, Splunk Scott Dally | Director Security Operations Center, NTT
Today, cybercriminals are consistently becoming more dangerous and more agile with their approach by using machine learning to exploit vulnerabilities. Sophistication of threats requires modern security solutions to keep up with malicious actors.
Many security professionals are challenged with managing the complexity of a shift to the cloud, operating with remote work and its accompanying security challenges, and dealing with mundane tasks, all while working through a skills shortage. Yikes.
Organizations today must adapt and evolve to deal with the broadscale ramifications of their security posture.
Join our webinar to learn more about:
- How to optimize security operations and productivity
- The impact that security threats have on a real-world perspective and learn Splunk/NTT’s approach to solving these threats
- Practicing a secure by design to help minimize security risk while you innovate and grow
- How security teams can better operationalize security across hybrid and multi cloud environments for enhanced visibility
Who Should Attend: Splunk Administrators, Security Analysts, SOC Manager
ES and ITSI Sitting in a Tree: How to use Notable Events to make Security and IT Collaboration Better
We’ve all heard the horror stories from Security and IT teams. Maybe it involves a maintenance window leaving a port open on the firewall that is being actively scanned by bad actors. Or perhaps security locks down the subnets for your cloud deployment and customers are unable to complete orders in the new stack. These problems are usually borne from groups working in silos and can result in costly and time consuming incidents that can impact the bottom line and create unnecessary threats.
This Tech Talk shares how to use what’s under the hood of ITSI and ES to share notable events and insights seamlessly between the two platforms.
- reduce your MTT-Everything
- knock down silos
- link Security and ITO together to increase velocity, while increasing visibility, and becoming more security minded
Rod Soto | Principal Security Research Engineer, Splunk Teoderick Contreras | Principal Security Research Engineer, Splunk
Who Should Attend: Splunk Administrators, Security Analysts, SOC Managers
Trickbot is a very popular crimeware carrier associated with recent ransomware campaigns. It is a trojan that has gained popularity from being effective at infecting and propagating botnets – one of the main financial drivers of cyber criminal groups. The effectiveness of trickbot crimeware comes from its stealthiness and versatility in installing payloads for further lateral movement and post-exploitation profit-driven activities such as cryptocurrency, ransomware, or banking fraud. But don’t worry! The Splunk Security Research team has developed an analytic story targeting Trickbot TTPs to help you detect them in your environment and respond immediately.
Tune in to learn:
-How Trickbots, botnets, and webinjects work together in a malicious cyber campaign
-How to utilize pre-built searches to detect Trickbots in your environment
-How to utilize pre-built automated playbooks to respond to Trickbots
Kaitlin Reynolds | Product Marketing Manager, IT, Splunk Thomas Booth | Technical Interlock Director, IT Operations, Splunk
Who Should Attend: Splunk Administrators, IT Analysts
Join us for a deep dive into how best to leverage logs and metrics to monitor key data sources from your on-prem or cloud environments. From system health to system availability, we’ll show you how you can get started with monitoring using log data across different platforms such as Linux, Windows, VMWare, and cloud (AWS), and how to augment monitoring dashboards with metrics and host metadata. You will come away knowing how to get all the information you need in one place to speed up troubleshooting.
Tune in to learn how to:
- Increase your Splunk Core for IT Operations use cases, no matter your customer’s geography or business vertical (PBST included)
- Ease adoption with prescriptive maturation journeys and out of the box content, ultimately accelerating customers towards ITSI
- Successfully transition a heavy install base of SAI and other “App for Infrastructure” users to ITE Work, built on ITSI code base for improved customer experience
Bill Emmett | Director, Product Marketing, Splunk Cordis Hall | Sales Engineer, Splunk
Who Should Attend: Site Reliability Engineer, Platform and Cloud Operations
If you’re like most Splunk Enterprise and Splunk Cloud customers, you’re getting all kinds of insights about your systems, applications, and services. But, have you thought about how effectively and efficiently your teams are responding to incidents? How many fires are you fighting? How many incidents have resolution owners? What kinds of incidents are most frequent? Do your alerts find an owner right away, or are they being passed around like a hot potato? Insights to all these questions — and acting on them — can be a game-changer for shortening outages, operating more efficiently, and reducing burnout in operations teams. This tech talk demonstrates the insights you can gain based on incident response from Splunk On-Call, and what you can do to get started.
Tune in to learn:
- What kind of incident response metrics and insights can I gain with Splunk
- What is Splunk On-Call
- How can I easily send on-call data into Splunk
Martin Wiser | Field Solution Engineer, Splunk Nikolas Kourtidis | SAP IT Sales Specialist, Splunk
Who Should Attend: Splunk Administrators, IT Analysts
Are issues in SAP making you feel like you’re missing information? There’s a problem but you don’t know what it is? We all know SAP is a complex, yet mission-critical part of your business. Issues, outages and blind-spots can impact your bottom line… and your sanity!
Join us on this webinar to learn how you can bridge infrastructure data and SAP data, resulting in:
- Reduction in downtime
- Advanced notice of potential outages
- Reduced incident investigation time -- we have customers seeing a 90% reduction!
- Less finger-pointing in the war room
Who Should Attend: Splunk Administrators, IT Analysts, NOC Managers
Faster Time to Value with ITSI Content Packs
Disparate services cause confusion across distributed teams, and onboarding to a new platform takes time and resources. With ITSI Content Packs, you can now set up your services with only a few clicks, for even faster time to value. Whether you’re invested in Microsoft 365 or SAP - we’ve got you covered.
Join this tech talk to learn about:
- How the Content Library helps you gain access to content packs across common tools and services you already use
- How to install Content Packs through the Content Library
- Best practices to gain the most out of ITSI
- Bulk updating of content packs through Splunkbase
Monitoring Core Web Vitals is, well, vital to ensuring users have a great experience when visiting your website, and are essential to driving traffic to your website. They are the most modern way to quantify the performance and user experience of a web property. Not only are Largest Contentful Paint (LCP), First Input Delay (FID), and Cumulative Layout Shift (CLS) important when optimizing your site, starting in Summer 2021 Google will begin using these three metrics as a factor in a site’s search rankings.
The importance of incorporating Web Vitals into your Observability practice is larger than ever. With Splunk Synthetic Monitoring you can proactively run tests to measure the performance of Google Web Vitals on your company’s website and alert you on any issue. And if your website needs improvement, our Web Optimization feature will run through hundreds of best practices, providing you with actionable insights to improve your user experience.
Join Splunk’s Billy Hoffman for a deep dive into Core Web Vitals and see why incorporating these user-centric metrics into your deployments can create great user experiences and improve your business.
In this webinar you will learn:
- What Core Web Vitals are, how they’re measured, and why they’re important to both the business and your Google ranking.
- How to measure Google Web Vitals on your website.
- Which Performance optimizations should be adopted to improve specific Web Vitals.
- Best practices for benchmarking and improving web vitals scores.
- How organizations can put systems in place to prevent regressions.
Morgan McLean | Director of Product Management, Observability GDI and Unified Observability Suite, Splunk
Who Should Attend: Site Reliability Engineer, Platform and Cloud Operations, Developer, Software Engineer, DevOps Engineer
OTel Me About Observability
Telemetry data is critical in solving both availability and performance issues, especially in distributed, polyglot architectures. Unfortunately, telemetry data has often been proprietary, at least when it comes to ease of use or combining different signals. OpenTelemetry is an open-source and vendor-agnostic project set on democratizing instrumentation and data collection of telemetry signals. Beyond providing the ability to generate and emit traces, metrics, and eventually logs, the project provides other core concepts, including the notion of resources, semantic conventions, and a collector component. In this talk, you will learn all about OpenTelemetry and how it can be used to help provide observability.
Takeaways from this webinar include:
- How to get started with OpenTelemetry
- Harnessing the power of OpenTelemetry in Splunk Observability Cloud
- The future of Observability
James Hodge, Splunk I William McKnight, McKnight Consulting Group I Kat Holmes, Travelex
The Data Age Series Episode 3
According to a recent survey, two-thirds of organisations are expecting the value and amount of data to grow almost 5x by 2025. The ‘Data Age’ is here to stay, and the way that we prepare now and the actions we take today will impact our ability to thrive. Embracing technologies like 5G, IoT, blockchain and edge computing, will increase the volume of data produced, and the ways in which data can be used productively to transform business strategy.
Join us in this final episode as we discuss:
- How cloud both fuels the ‘Data Age’ and can help navigate it
- How different industries, including retail, healthcare, finserv, manufacturing and the private sector are embracing the ‘Data Age’
Jose Hernandez | Sr. Manager, Threat Research, Splunk David Dorsey | Security Research, Splunk
Detection engineers consistently come up with excellent rules and heuristics to detect malicious and anomalous behaviors in their environment; a perfect example of this is password spraying. But since we can’t have nice things, there is always software or behaviors that violate the base assumption for that detection. This doesn’t invalidate the rule, but it does require that the rule have exceptions built into the rules. Doing this manually is tedious and time consuming. When a rule consistently gives false positives, it is natural and understandable to just ignore the rule. But that comes at the expense of when the rule detects something that is malicious.
In this talk we will use password spraying as an example use case to showcase how detections can be matured through the use of Machine Learning.
- Join our webinar, “Enhance your Security Detections with Machine Learning” and learn:
- How to take a data driven approach to detection development
- How to mature a detection to detect increasingly sophisticated attackers
- How to use Splunk’s Machine Learning Toolkit to understand behaviors
Who Should Attend: Site Reliability Engineers, Platform and Cloud Operations, Developers, Software Engineers, DevOps Engineers
How to instrument Java Applications
This webinar will discuss the various in-product configuration steps in detail on auto-instrumenting a basic Java application with Splunk APM. Configuration examples will include deployments of a basic Java application with and without Kubernetes and how the auto-instrumentation process is different with container orchestration.
Tune in to learn about:
- Splunk APM’s in-product configuration steps for easy instrumentation with OpenTelemetry
- How to deploy the OpenTelemtry collector in Linux and Kubernetes
- How the Splunk OpenTelemtry collector gathers metrics
Alan Hill, Public Sector Strategic Solutions, Shaun Cooney, Strategic Advisor and Ian Keller, Director of Customer Security
The global ‘State of Security 2021’ report recently published by Splunk and ESG Research presents insights and best practices from interviews with some of today’s most successful security leaders. This panel of experts will take a look at key report findings, and discuss the theory and practicality of best practices for Information Security Strategy Development, Program Operations and Incident Management.
Join us to learn:
- How to identify and prioritize items in the information security program that require funding
- Where to start, how to pull the toolkit together, and the real definition of “good enough”
- What the state of security architecture is today, and the capabilities every operations team should have when establishing a DevSecOps practice
Who Should Attend: Splunk Administrators, IT Analysts, NOC Managers, Site Reliability Engineers, Platform and Cloud Operations
The Convergence of Observability & IT Teams
In today’s world, monitoring must evolve into observability to support hybrid and cloud-native environments. The increasing complexity of data sources presents a significant challenge. As our customers accelerate their migrations, they need to evolve their monitoring strategies to keep pace with the dynamic demands of their increasingly digital business.
In this session you’ll learn how our customers use the entire Splunk Observability and IT Ops portfolio to decrease MTTR and improve customer satisfaction. We'll run the attendees through a deep dive into Splunk’s IT Portfolio with a fully integrated demonstration. From pipeline creation to value realization and everything in between, Splunk has you covered.
Tune in to learn:
- How to utilize DSP to make sure you get the data you NEED at the right time in the right place and for the right reason.
- To harness the power of the Splunk IT portfolio to locate, troubleshoot and resolve issues efficiently and effectively
- Best practices for data sources, infrastructure monitoring and service monitoring
Stephane Estevez, EMEA Director of Product Marketing, IT Markets at Splunk
If 100% of your applications are cloud-native and running exclusively in the cloud(s) - then life must be pretty good, and this webinar isn’t for you. However, if you’re part of the masses; managing fragmented operational data trapped in siloed tools; searching for a true real-time view of your on-prem and hybrid/multi-cloud infrastructure… we see you.
You fight to gain the end-to-end view. You constantly hunt for context lost between siloed tools.
You feel the growing pressure for business service views. You’re straining to keep sight of the impossible, where in today’s world, a user transaction can be initiated by a microservice, running on containers in the cloud, and end up in an SAP system on-premises. You know that’s what really matters to organization management… the transaction performance. You just need the right tools and models for you and your business. Join this webinar so you can learn more about:
- Overcoming typical end-to-end transaction monitoring challenges
- Best practices for on-prem/hybrid/multi-cloud monitoring
- What capabilities organizations need to look out for when choosing the right tools
- How to best optimize hybrid and multi-cloud management
- How Splunk can help
Martin Adler, Head of APM and Monitoring at Helvetia
Helvetia, the global insurance group has over 3,500 employees, serving more than one million customers. That’s a lot of applications and solutions to monitor. Having a unified, next generation monitoring system has never been more important.
Join the session to see Martin Adler, Head of APM and Monitoring at Helvetia discuss the company’s cloud-first strategy, an overview of next generation monitoring and the business value that the team has seen.
Martin discusses his experience of Splunk Observability while diving into three use cases to illustrate the improved velocity and reduced effort thanks to Helvetia’s approach.
Bob Laliberte | Sr. Analyst & Practice Director, ESG Greg Leffler | Observability Practitioner Director, Splunk
Global research reveals IT leaders’ early investments in observability improve performance, customer experiences – and the bottom line.
Application & IT environments are rapidly evolving, modernizing, and becoming more complex – making it much more difficult to continue understanding their performance, availability, and plans for future growth. Organizations have to ensure their monitoring and observability platforms are powerful enough to accelerate their cloud transitions and development velocity.
Join industry experts from Splunk and ESG as they discuss what benefits global organizations that have adopted observability are experiencing in areas such as application performance, deployment velocity, and application development.
In this interactive session, we’ll present some results from this research and then start a discussion around:
- What is observability and what outcomes you’ll see from adopting observability practices
- The four characteristics of a mature observability practice
- Common pain points in the adoption of observability
- What to look for in an observability solution and how to justify your requests
Ian Forrest | Staff Security Strategist, Splunk Olivia Courtney | Product Marketing Specialist, Splunk
Who Should Attend: Splunk Administrators, Security Analysts, SOC Managers
SOARing to the Cloud with Splunk SOAR
For years, security practitioners have kicked and screamed about their reality. There are too many alerts to fully investigate and manually resolve every day. There is a massive talent shortage of qualified security professionals across the globe. Then couple that with analyst burnout and siloed security point-products. It’s time to stop working harder and start working smarter. Stop playing defense by just reacting to incoming threats. Go on the offensive, get empowered, and get in control of your security operations so you can achieve your strategic goals.
Splunk SOAR is now deployable from the cloud, further delivering on our promise to modernize security operations. Cloud-delivered security makes security operations easier, more agile, and more efficient, helping you stay one step ahead of threats.
Tune in to this Tech Talk to learn about:
- The SOAR deployment options to truly “SOAR your own way”
- How to simplify playbook creation using the new Visual Playbook Editor
- Why security orchestration, automation and response from Splunk can supercharge your security
James Hodge, Splunk I Jasmina Lazic, Bayes Centre, Uni. Edinburgh I Jason Sarayno, Uniper I Maija Hovila, Kone
The Data Age Series Episode 2
Out of the 86% of businesses who reported that they are not ready for the ‘Data Age’, only 8% think that they will be ready in time. As businesses confront the rising tide of data, they will face certain challenges and hurdles. Being as prepared as possible, adapting to digital transformation, and shifting mindsets and cultures is key to making the most out of this business change.
Join us in this episode, as we share:
- How businesses can evolve from being data collectors to data innovators
- The fundamental hurdles to overcome, from coping with the data wave to adopting new technologies
- Recommendations from thought leaders on building a model and strategy to cope with the incoming data wave
Josh Atwell, Sr Technology Advocate for Splunk and Randy Shoup, VP of Engineering for eBay
In this session Randy Shoup re-joins Josh Atwell to discuss the future for development and IT operations organizations given the present availability of more capable tools and methodologies. Josh and Randy will explore the outcomes today’s technology professionals can anticipate in an environment better equipped to deliver the highest levels of business performance, minimized downtime, and world-class digital service and user experiences.
Splunk is the world’s first Data-to-Everything Platform. Now organizations no longer need to worry about where their data is coming from, and they are free to focus on the business outcomes that data can deliver. Innovators in IT, Security, IoT and business operations can now get a complete view of their business in real time, turn data into business outcomes, and embrace technologies that prepare them for a data-driven future.
Fight Fraud with Data: How States Can Confront Unemployment Insurance (UI) AbuseJoe Beck, Division of Information Technology, New Jersey | Juliana Vida, Splunk | Dan Lohrmann, Center for Digital Government[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]60 mins