Hi [[ session.user.profile.firstName ]]

A Day in the Life of a GDPR Breach

You’re a CIO, CISO or DPO - and you’ve been woken up in the middle of
the night because personal data held by your organization has been
discovered for sale on the dark web. This disclosure puts the privacy of
your customers at risk. What do you do next?
Join this session to learn about the impact of GDPR and go through a
breach investigation and response scenario as it would be after GDPR
comes into effect in May 2018. You’ll hear from Splunk’s Data Privacy
Officer Elizabeth Davies and Splunk’s Security Ninja Matthias Maier.

What you'll learn:
● What breach response will look like under the GDPR
● What tools and processes a data privacy officer will rely on in
case of a breach
● What departments and entities will be involved beyond IT
● What activities are currently happening within organizations to
prepare for the GDPR
● What the consequences of the breach could be
Recorded Oct 25 2017 64 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Splunk’s Data Privacy Officer, Elizabeth Davies and Splunk’s Security Ninja, Matthias Maier
Presentation preview: A Day in the Life of a GDPR Breach

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Get Ahead of Advanced Attacks and Threats Jul 11 2019 4:00 am UTC 46 mins
    Girish Bhat, Security Product Marketing, Splunk; Tom Smit, Staff Sales Engineer, Splunk
    Dealing with advanced threats is the most significant concern for cybersecurity professionals, according to a recent survey. The Verizon 2018 Data Breach Investigations report indicates that there were 2,216 confirmed data breaches in 2017.

    What went wrong is the failure to explore trends and data. Without understanding all security relevant data, getting ahead of threats is daunting and frankly impossible. But it doesn’t have to be.

    Join this webinar to learn about:
    - The benefits of early and timely detection of advanced threats
    - Understanding what the data is telling you
    - Optimizing investigations and response to address threats
    - Improving investigation and operational efficiency
  • Learn Ways to Stay Ahead of Advanced and Insider Threats Jul 3 2019 4:00 am UTC 56 mins
    Kenneth Westin, Girish Bhat, Patriz Regalado
    Let’s face it – when it comes to advanced threats, security operations teams have no pre-defined indicators to guide them on “what to look for,” leaving them vulnerable to attack. Advanced threats are designed to compromise one or more systems, and establish persistence and communication channels to direct activities to accomplish its goals. Adversaries use multiple attack vectors which are difficult to discover, remove, and attribute.

    The key is to make more informed decisions and pre-empt issues before they occur. The only way to combat and stay ahead of advanced threats is to apply advanced analytics, so you can quickly identify, investigate, respond and adapt to threats in dynamic, digital environments.

    Join us for an overview and demonstration by Splunk Security experts and learn how you can:

    • Benefit from early and timely detection of advanced and insider threats
    • Detect malicious activity within and across the cyber kill chain
    • Detect anomalous activity with advanced statistical analysis and machine learning
    • Gain additional context to investigations by leveraging machine learning
    • Optimize investigations, respond to threats, and increase operational efficiency
    • Leverage 3rd party tools for threat management


    Kenneth Westin
    Staff Security Strategist
    Splunk Inc.

    Girish Bhat
    Director, Product Marketing
    Splunk Inc.

    Patriz Regalado
    Sr Product Marketing Manager
    Splunk Inc.
  • 5 Steps to a Predictive IT Strategy to Achieve Mission Success Jun 25 2019 4:00 am UTC 46 mins
    Bryan Jennewein, Andreia Martins and Retesh Shah
    Countless platforms promise predictive capabilities for your IT organization. What is your strategy for integrating artificial intelligence and machine learning, and what do you need from your tech stack to be successful?

    Watch our webinar with Vodafone and Accenture to understand the 5 critical components to build an effective AI strategy, benefits realized from implementing a predictive IT solution, and what to look for when evaluating predictive analytics solutions.

    What you’ll learn:
    • 5 steps to an effective predictive IT strategy
    • How Vodafone with Accenture improved their customer experience with AI
    • Where AI can help, and where it can’t

    Featured Presenters:

    Bryan Jennewein
    Director, Product Marketing
    Splunk Inc.

    Andreia Martins
    Head of IT Operations
    Vodafone UK

    Retesh Shah
    Application Outsourcing Lead for Vodafone
    Accenture UK
  • Is Your SOC Soaring or Snoring? Jun 20 2019 4:00 am UTC 55 mins
    George Khoury, Product Marketing Manager, Splunk APAC & James Young, Splunk APAC Security Strategist
    Force Multiply your Security Analysts by Ten

    How many security alerts can your operations team process daily? Not enough? Many organisations are in the same boat; looking for ways to mature their security operations, and increase the efficiency of skilled security analysts. However, teams that utilise Security Orchestration, Automation & Response (SOAR) platforms are seeing improvements in scale, consistency, and are responding to alerts at machine speed.

    Join this webinar to learn:
    - What the security response process performed by security analysts looks
    like when employees report phishing attempts
    - What applications and tools a security analyst utilises to respond
    - What SOAR is and can help you achieve
    - How responses look in comparison when utilising a SOAR solution
    - Three top tips on getting started to ensure successful automation and
    orchestration in your organisation
  • A Tale of Two SOCs: Regaining Control Using Automation Jun 18 2019 4:00 am UTC 55 mins
    Mauricio Velazco, Chris Decker and Chris Simmons
    Is the volume of inbound security alerts outpacing the investigation and response capacity of your team? If so, you are not alone. Many organizations are looking for ways to bridge their talent gap, work more efficiently, and respond to threats faster.

    Join this recorded panel discussion to hear the journey of two teams who are using the Splunk Phantom security orchestration, automation and response (SOAR) platform to mature their operations.

    You will learn:
    • Security challenges unique to their environment
    • How the Phantom SOAR platform helps
    • Lessons learned during their automation journeys


    Mauricio Velazco
    VP, Threat Management

    Chris Decker
    Enterprise Security Manager
    Penn State University

    Chris Simmons
    Product Marketing, Phantom
    Splunk Inc.
  • Security Investigation: Restoring Calm from Chaos Recorded: Jun 13 2019 66 mins
    Jae Lee, Director, Product Marketing, Splunk, Inc.
    Security teams are underfunded, understaffed and overwhelmed by constantly putting out fires. They struggle to deal with threats and attacks, while having to answer hard questions from management. Everyone is demanding detailed, accurate answers about cyberthreats and risk and compliance – and they all need answers NOW.

    So, how useful is it to know that you’re not alone, since others are in the same boat? The answer is “not useful at all.” What IS useful, is knowing how to work smarter and get answers faster.

    Join us in this one-hour technical deep dive and demo to learn:
    •How to analyze events from three common data sources to look for malicious activity
    •How to get more efficient at discovery, triage and the investigation of potential security incidents
    •How to leverage automation methods to accelerate investigations and get answers faster

    This webinar will provide demo examples of how to ask questions of your machine data to get security insights. For example, we will explore whether login behavior looks suspicious the root cause of how an attacker entered your network. We’ll show how you can get to investigative findings quickly and make use of those answers just as quickly. This webinar aims to help security teams learn how to stay focused on solving security problems faster so they can get ahead of it all.
  • Real Time IT Monitoring. Your Mission Depends On It Recorded: Jun 11 2019 59 mins
    Ashok Sankar, Phillip Adams, John Israel, Jonathan Fair
    Whether the mission is citizen service or keeping the country safe, government agencies rely on a complex network of heterogeneous devices, systems, and applications. Maximizing their availability and performance is critical for mission success.

    Watch this on-demand webinar of industry-leading panelists to learn:
    • Insights from teams who are using real-time IT monitoring to mature their operations
    • How to maximize availability and performance of infrastructure that supports mission-critical systems
    • Tips for predicting and preventing to improve the probability of mission success


    Ashok Sankar
    Director, Industry Marketing
    Splunk Inc.

    Phillip Adams
    CTO & Lead Architect
    The National Ignition Facility (NIF) at Lawrence Livermore Laboratory

    John Israel
    Director of Intelligence Operations
    August Schell Enterprise

    Jonathan Fair
    Sr Security Analyst & Splunk SME
    DIOS Tech LLC
  • Investigate Security Incidents Like a Boss Recorded: Jun 6 2019 53 mins
    Jae Lee, Director, Product Marketing, Splunk Inc.
    For security teams, having the ability to investigate a security incident quickly and accurately is still the most fundamental skill needed to combat the majority of cyberthreats and attacks. The average organization is being attacked on a weekly basis, without the right processes and tools in place to pinpoint root cause without delay, and put the right countermeasures in place in time to minimize damage.

    Join us in this 1-hour webinar to learn:
    • Why investigating security and non-compliance incidents can be so difficult
    • Why machine data generated by your business is so important to security
    • How to get better at performing investigations -- regardless of the size or skill level of your security staff

    We will provide a methodology to help you align how you think about your organization’s security processes – the goal is to help you develop an investigative mindset that addresses a broad range of security and compliance concerns, in a pragmatic and targeted manner, specific to your own needs.
  • Splunk 2019 Predictions Recorded: May 30 2019 36 mins
    Ale Espinosa, Seema Haji, Faya Peng, Jerome Stewart
    See what's in store for Machine Learning, AI, IT Operations, Security & IoT

    Each year brings bigger and better technology and innovation — 2019 will not be any different. Pulling together insights from our thousands of customer and our dedicated research teams, our experts have assembled a short list of top predictions for 2019.

    Join our Splunk panel of experts for our 2019 Predictions webinar as they discuss what’s in store for 2019 and how you can benefit from the technology and trends poised to transform business in 2019!

    In this webinar, you'll learn about:

    •Artificial Intelligence and Machine Learning as it breaks out of the lab
    •Security in the wake of heightened compliance regulations and evolving digital environments
    •IT Operations as it transforms to focus on application mobility
    •IoT as it claims its stake in the modern organization


    Ale Espinosa
    Sr Director, Security Product Marketing
    Splunk Inc.

    Seema Haji
    Sr Director, IoT Product Marketing
    Splunk Inc.

    Faya Peng
    Sr Director, IT Product Marketing
    Splunk Inc.

    Jerome Stewart
    Sr Director, Platform Product Marketing
    Splunk Inc.
  • Machine Learning & Artificial Intelligence: Behind the Buzz Words Recorded: May 28 2019 31 mins
    Edwin Yuen, Anne McCarthy, Stephen Luedtke
    Artificial intelligence and machine learning are the latest buzz words – but what does it actually mean to you and what should you do about it? Watch this webinar to hear ESG analyst Edwin Yuen and our Splunk experts discuss:

    ● AI & ML trends
    ● Benefits of leveraging AI & ML
    ● Barriers to adoption and how to overcome them
    ● AI & ML approaches – what’s right for you?
  • Getting Started with Machine Learning Recorded: May 23 2019 57 mins
    Andrew Stein, Principal Product Manager
    You’ve heard the buzz about artificial intelligence and machine learning and now you want to bring their benefits to your organization. In the second webinar in our AI & ML series, we will dive into more depth on machine learning solutions and how they can help you. In this webinar, we’ll talk through using machine learning concepts such as:

    ● Anomaly Detection
    ● Association
    ● Classification
    ● Clustering
    ● Estimation
    ● Prediction
    ● Regression
    ● Re-inforcement learning
    ● And much more!

    You’ll walk away with an understanding of how ML can help improve your decision making, forecast or predict KPIs, alert on deviation and uncover hidden trends or relationships.
  • Four Steps to Transform Your IT Monitoring Mission Recorded: May 21 2019 75 mins
    Andi Mann, Chief Technology Advocate, Splunk, Inc. and Pankaj Prasad, Sr Principal Analyst, Gartner
    IT Ops teams are now critical to an organization’s success and require a strategy that aligns with the organization’s objectives and its external stakeholders. Most infrastructure monitoring solutions haven’t caught up to meet these new requirements, forcing IT teams to resort to traditional monitoring strategies that don’t allow for innovation and growth.

    Join Gartner analyst Pankaj Prasad and Splunk’s Chief Technology Advocate, Andi Mann, as we discuss new trends in IT monitoring strategy, best practices, and new IT models to implement in your organization.

    Here’s what you’ll learn:
    • How to effectively approach your IT monitoring strategy in this new world of IT
    • Build a successful IT infrastructure operating model to get to market faster, innovate, and respond in real-time
    • Best practices for integrating LOB owners, application developers and external stakeholders into your strategy
  • Key Performance Indicators to Accelerate Your IT Modernization Recorded: Apr 30 2019 46 mins
    Don Mahler, Director, IT Performance Management, Leidos & Taylor Crump, Product Marketing, Splunk
    Determining the right metrics and key performance indicators (KPIs) between the business and IT is only half of the picture need when getting modern IT to operate effectively. You need all the right data to be looked at too.

    Join us to learn about the right data types in conjunction with the right KPIs that you need to look at, from Leidos, a FORTUNE 500® global science and technology solutions leader, who has successfully transformed their business to be able to make data-driven decision based on their IT data and health information.
  • The 8 Biggest Mistakes in IT and How to Avoid Them Recorded: Apr 18 2019 33 mins
    Kara Gillis, Director of Product Marketing, Splunk
    You’ve heard about the top trends in IT - but how do you use this information to take meaningful action? How do you encourage collaboration between the business, developers, and operations? How do you up-level IT as a service provider that reduces manual processes and troubleshooting without context to focus on strategic initiatives that impact important KPIs? By avoiding these 8 mistakes IT practitioners makes!

    In this webinar, we’ll talk through avoiding:

    -Friction between IT and the business
    -Cumbersome and difficult root cause analysis
    -Not preparing for Incident response
    -And many others!

    You’ll walk away with an understanding of how to apply lessons learned to your own organization and operate maximum scale!
  • Predicting Failures Before They Happen With Machine Learning Recorded: Apr 11 2019 38 mins
    Nate Smalley, Principal Sales Engineer and Andrew Stein, Staff Business Analytics & IoT Practitioner
    Imagine a world without outages. Glorious, isn’t it? We’d like to help you get there. So how do you stop IT events before they escalate into outages? With a little help from machine learning.

    The predictive capabilities from the Splunk Machine Learning Toolkit (MLTK) combined with the Event Analytics capabilities in Splunk IT Service Intelligence (ITSI) give operations teams like yours the opportunity to proactively act on an event before it becomes an outage. Whether your current IT state is reactive or you’re already in a somewhat proactive state, these predictive capabilities will be something you’ll want to take note of!

    Join our webinar to learn how to:

    ● Predict a service health score
    ● Proactively take action based on those predictions
    ● Employ novel tactics for better incident management using advanced search commands
  • Getting Started with Security Operations: How to Access Basic Security Posture Recorded: Apr 4 2019 62 mins
    Jae Lee – Director Product Marketing, Security Markets, Splunk
    Assessing and monitoring basic security posture is critical. Security teams need the ability to identify and alert on a particular type of malicious activity, AND determine whether that alert is meaningful in a broader context.

    Splunk can help your organization get up and running very quickly with the ability to assess basic security posture. With Splunk, you can centralize security visibility and adopt an investigative mindset to answer questions like:

    - How secure are my endpoints?
    - What is happening on my network?
    - Where is it most critical for me to apply updates?
    - Are user accounts configured properly?
    - Is there any suspicious traffic going out?
    - How is overall security posture in my AWS environment?

    This webinar is perfect for organizations that are just getting started with formalizing their security operations. We’ll show you how with Splunk Security Essentials, a use case framework tool that you can download and stand up quickly to immediately glean security value using your own data sources.
  • Best Practices: Working With and Using Splunk Cloud Recorded: Dec 6 2017 34 mins
    Shaun Bland, Texas, Splunk Eric Six, Staff Architect, Splunk
    Learn best practices for working with and using Spunk Cloud, including latest feature adoption, Splunk validated architecture, getting data in and working with Support. All the things that are better to know now, not later!
  • Analytic Stories or How I Learned to Stop Worrying and Respond to Threats Recorded: Nov 29 2017 36 mins
    David Dorsey, Principal Research Engineer, Splunk
    How do you know what to look for in your environment? Then what do you do when you find it? This session will help you answer these questions and more! Analytic stories provide a way to organize your searches, understand how to respond to events and what data is needed to detect and respond to this threat and detail why you should care about a given threat. They also allow you to map to different security frameworks so business owners can think about their security posture in business terms. This talk will discuss what makes up an analytic story, how they can be used to guide and inform your investigation and how to better understand your security posture.
  • A Day in the Life of a GDPR Breach Recorded: Oct 25 2017 64 mins
    Splunk’s Data Privacy Officer, Elizabeth Davies and Splunk’s Security Ninja, Matthias Maier
    You’re a CIO, CISO or DPO - and you’ve been woken up in the middle of
    the night because personal data held by your organization has been
    discovered for sale on the dark web. This disclosure puts the privacy of
    your customers at risk. What do you do next?
    Join this session to learn about the impact of GDPR and go through a
    breach investigation and response scenario as it would be after GDPR
    comes into effect in May 2018. You’ll hear from Splunk’s Data Privacy
    Officer Elizabeth Davies and Splunk’s Security Ninja Matthias Maier.

    What you'll learn:
    ● What breach response will look like under the GDPR
    ● What tools and processes a data privacy officer will rely on in
    case of a breach
    ● What departments and entities will be involved beyond IT
    ● What activities are currently happening within organizations to
    prepare for the GDPR
    ● What the consequences of the breach could be
Splunk Webinars and Videos for APAC
Description: Splunk Inc. (NASDAQ: SPLK) is the market leader in analyzing machine data to deliver Operational Intelligence for security, IT and the business. Splunk® software provides the enterprise machine data fabric that drives digital transformation. More

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: A Day in the Life of a GDPR Breach
  • Live at: Oct 25 2017 12:00 am
  • Presented by: Splunk’s Data Privacy Officer, Elizabeth Davies and Splunk’s Security Ninja, Matthias Maier
  • From:
Your email has been sent.
or close