SlideShare a Scribd company logo
Copyright	
  ©	
  2015	
  Splunk	
  Inc.	
  
The	
  Splunk	
  App	
  for	
  
Enterprise	
  Security	
  	
  
	
  
Holger	
  Sesterhenn,	
  
Sen.	
  Sales	
  Engineer,	
  CISSP	
  
	
  
MaChias	
  Maier,	
  	
  
Security	
  Product	
  MarkeEng,	
  EMEA	
  
	
  
	
  
	
  
2	
  
Ihr	
  Webcast	
  Team	
  
Ma#hias	
  Maier	
  
Security	
  Product	
  MarkeEng,	
  EMEA	
  
mmaier@splunk.com	
  
Holger	
  Sesterhenn	
  
Sen.	
  Sales	
  Engineer	
  
hsesterhenn@splunk.com	
  
Copyright	
  ©	
  2015	
  Splunk	
  Inc.	
  
Safe	
  Harbor	
  Statement	
  
During	
   the	
   course	
   of	
   this	
   presentaEon,	
   we	
   may	
   make	
   forward	
   looking	
   statements	
   regarding	
   future	
  
events	
  or	
  the	
  expected	
  performance	
  of	
  the	
  company.	
  We	
  cauEon	
  you	
  that	
  such	
  statements	
  reflect	
  our	
  
current	
  expectaEons	
  and	
  esEmates	
  based	
  on	
  factors	
  currently	
  known	
  to	
  us	
  and	
  that	
  actual	
  events	
  or	
  
results	
  could	
  differ	
  materially.	
  For	
  important	
  factors	
  that	
  may	
  cause	
  actual	
  results	
  to	
  differ	
  from	
  those	
  
contained	
  in	
  our	
  forward-­‐looking	
  statements,	
  please	
  review	
  our	
  filings	
  with	
  the	
  SEC.	
  	
  The	
  forward-­‐looking	
  
statements	
  made	
  in	
  this	
  presentaEon	
  are	
  being	
  made	
  as	
  of	
  the	
  Eme	
  and	
  date	
  of	
  its	
  live	
  presentaEon.	
  
If	
  reviewed	
  aSer	
  its	
  live	
  presentaEon,	
  this	
  presentaEon	
  may	
  not	
  contain	
  current	
  or	
  accurate	
  informaEon.	
  	
  
We	
  do	
  not	
  assume	
  any	
  obligaEon	
  to	
  update	
  any	
  forward	
  looking	
  statements	
  we	
  may	
  make.	
  In	
  addiEon,	
  
any	
  informaEon	
  about	
  our	
  roadmap	
  outlines	
  our	
  general	
  product	
  direcEon	
  and	
  is	
  subject	
  to	
  change	
  at	
  
any	
  Eme	
  without	
  noEce.	
  It	
  is	
  for	
  informaEonal	
  purposes	
  only	
  and	
  shall	
  not	
  be	
  incorporated	
  into	
  any	
  
contract	
   or	
   other	
   commitment.	
   Splunk	
   undertakes	
   no	
   obligaEon	
   either	
   to	
   develop	
   the	
   features	
   or	
  
funcEonality	
  described	
  or	
  to	
  include	
  any	
  such	
  feature	
  or	
  funcEonality	
  in	
  a	
  future	
  release.	
  
Copyright	
  ©	
  2015	
  Splunk	
  Inc.	
  
How	
  Can	
  Splunk	
  Help?	
  
Roadmap	
  
Security	
  Strategy	
  
Security	
  Posture	
  
Visual	
  Security	
  AnalyEcs	
  
Advanced	
  Threats	
  
Insider	
  Threat	
  
Roadmap	
  
Security	
  Strategy	
  
Source:	
  Mandiant	
  M-­‐Trends	
  Report	
  2012/2013/2014	
  
67%	
  
VicEms	
  noEfied	
  
by	
  an	
  external	
  
enEty	
  
100% 	
  
Valid	
  credenEals	
  
were	
  used	
  
229	
  
Median	
  #	
  of	
  
days	
  before	
  
detecEon	
  
The	
  Ever-­‐Changing	
  Threat	
  Landscape	
  
Copyright	
  ©	
  2015	
  Splunk	
  Inc.	
  
Intrusion	
  	
  
DetecEon	
  
Firewall	
  
Data	
  Loss	
  
PrevenEon	
  
AnE-­‐Malware	
  
Vulnerability	
  
Scans	
  
AuthenEcaEon	
  
TradiEonal	
  Security	
  Strategy	
  
Copyright	
  ©	
  2015	
  Splunk	
  Inc.	
  
Connect	
  the	
  Dots	
  Across	
  All	
  Data	
  
Servers	
  
Storage	
  
Desktops	
  Email	
   Web	
  
TransacEon	
  
Records	
  
Network	
  
Flows	
  
Hypervisor	
   Custom	
  
Apps	
  
Physical	
  
Access	
  
Badges	
  
Threat	
  
Intelligence	
  
Mobile	
  
CMBD	
  DHCP/DNS	
  
Intrusion	
  	
  
DetecEon	
  
Firewall	
  
Data	
  Loss	
  
PrevenEon	
  
AnE-­‐
Malware	
  
Vulnerability	
  
Scans	
  
AuthenEcaEon	
  
Copyright	
  ©	
  2015	
  Splunk	
  Inc.	
  
ConnecEng	
  the	
  “Data	
  Dots”	
  via	
  MulEple/Dynamic	
  RelaEonships	
  
Persist,	
  Repeat	
  
Threat	
  Intelligence	
  
Auth—User	
  Roles	
  
Host	
  	
  
Ac@vity/Security	
  
Network	
  	
  
Ac@vity/Security	
  
ACacker,	
  know	
  relay/C2	
  sites,	
  infected	
  sites,	
  IOC,	
  
aCack/campaign	
  intent	
  and	
  aCribuEon	
  
Where	
  they	
  went	
  to,	
  who	
  talked	
  to	
  whom,	
  aCack	
  
transmiCed,	
  abnormal	
  traffic,	
  malware	
  download	
  
What	
  process	
  is	
  running	
  (malicious,	
  abnormal,	
  etc.)	
  
Process	
  owner,	
  registry	
  mods,	
  aCack/malware	
  
arEfacts,	
  patching	
  level,	
  aCack	
  suscepEbility	
  
Access	
  level,	
  privileged	
  users,	
  likelihood	
  of	
  infecEon,	
  
where	
  they	
  might	
  be	
  in	
  kill	
  chain	
  	
  
Delivery,	
  exploit	
  
installa@on	
  
Gain	
  trusted	
  
access	
  
Exfiltra@on	
  Data	
  gathering	
  Upgrade	
  (escalate)	
  
lateral	
  movement	
  
Persist,	
  repeat	
  
	
  
AnalyEcs-­‐Driven	
  Security	
  
Risk	
  Based	
   Context	
  and	
  Intelligence	
  
ConnecEng	
  Data	
  
and	
  People	
  
Copyright	
  ©	
  2015	
  Splunk	
  Inc.	
  
Sample	
  Nasdaq	
  -­‐	
  Heartbleed	
  
Complement,	
  replace	
  and	
  go	
  beyond	
  tradi@onal	
  SIEMs	
  
Security	
  Intelligence	
  Use	
  Cases	
  
13	
  
SECURITY	
  &	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  
COMPLIANCE	
  
REPORTING	
  
REAL-­‐TIME	
  
MONITORING	
  OF	
  
KNOWN	
  THREATS	
  
MONITORING	
  	
  
OF	
  UNKNOWN	
  
THREATS	
  
INCIDENT	
  
INVESTIGATIONS	
  
&	
  FORENSICS	
  
FRAUD	
  	
  
DETECTION	
  
INSIDER	
  	
  
THREAT	
  
Roadmap	
  
Security	
  Strategy	
  
• ConnecEng	
  Data	
  and	
  People	
  
Security	
  Posture	
  
15	
  
What’s	
  New	
  in	
  Splunk	
  App	
  for	
  Enterprise	
  Security	
  3.3	
  
BeCer	
  
DetecEon	
  of	
  
Advanced	
  
Threats	
  
•  STIX/TAXII	
  &	
  OpenIOC	
  
threat	
  intelligence	
  
•  IOC/arEfacts	
  research	
  
Improved	
  
CollaboraEon	
  
•  Export	
  correlaEon	
  
searches,	
  KSIs,	
  swim	
  lanes	
  
BeCer	
  
DetecEon	
  of	
  
Malicious	
  
Insiders	
  
•  User	
  acEvity	
  monitoring	
  
dashboard	
  and	
  swim	
  lanes	
  
•  Access	
  anomalies	
  	
  
Faster	
  Incident	
  
Response	
  
•  Added	
  funcEonality	
  to	
  
Incident	
  Response	
  page	
  
Benefit	
  Feature	
  
Roadmap	
  
Security	
  Strategy	
  
• ConnecEng	
  Data	
  and	
  People	
  
Security	
  Posture	
  
• SituaEonal	
  Awareness	
  
Visual	
  Security	
  AnalyEcs	
  
Roadmap	
  
Security	
  Strategy	
  
• ConnecEng	
  Data	
  and	
  People	
  
Security	
  Posture	
  
• SituaEonal	
  Awareness	
  
Visual	
  Security	
  AnalyEcs	
  
• Contextual	
  Analysis	
  
Advanced	
  Threats	
  
Copyright	
  ©	
  2015	
  Splunk	
  Inc.	
  
hCp://sExproject.github.io/about/	
  	
  
Copyright	
  ©	
  2015	
  Splunk	
  Inc.	
  
STIX/TAXII	
  and	
  Open	
  IOC	
  101	
  	
  
•  Info	
  sharing	
  across	
  companies	
  and	
  	
  
industries	
  	
  
•  Standardized	
  XML	
  
•  Contains	
  TTPs,	
  IOCs,	
  COA	
  
•  IOCs	
  include	
  IPs,	
  web/e-­‐mail	
  	
  
domains,	
  hashes,	
  processes,	
  	
  
registry	
  key,	
  cerEficates	
  	
  
•  hCp://sExproject.github.io/about/	
  
Copyright	
  ©	
  2015	
  Splunk	
  Inc.	
  
Threat	
  Intelligence	
  in	
  Splunk	
  
Copyright	
  ©	
  2015	
  Splunk	
  Inc.	
  
TAXII	
  Services	
  
Source:	
  hCp://hailataxii.com	
  
Copyright	
  ©	
  2015	
  Splunk	
  Inc.	
  
Sample	
  TAXII	
  Feeds	
  
User	
  Community	
   Organisa@on	
  
Cyber	
  Threat	
  XChange	
   Health	
  InformaEon	
  Trust	
  Alliance	
  
Defense	
  Security	
  InformaEon	
  Exchange	
   Defense	
  Industrial	
  Base	
  InformaEon	
  and	
  Sharing	
  
and	
  Analysis	
  OrganizaEon	
  
ICS-­‐ISAC	
   Industrial	
  Control	
  System	
  InformaEon	
  Sharing	
  and	
  
Analysis	
  Center	
  
NH-­‐ISAC	
  NaEonal	
  Health	
  Cybersecurity	
  
Intelligence	
  Planorm	
  
NaEonal	
  Health	
  InformaEon	
  and	
  Analysis	
  Center	
  
FS-­‐ISAC	
  /	
  Soltra	
  Edge	
   Financial	
  Services	
  InformaEon	
  Sharing	
  and	
  
Analyses	
  Center	
  (FS-­‐ISAC)	
  
Retail	
  Cyber	
  Intelligence	
  Sharing	
  Center,	
  
Intelligence	
  Sharing	
  Portal	
  
Retail	
  InformaEon	
  Sharing	
  and	
  Analysis	
  Center	
  
(Retail-­‐ISAC)	
  
More:	
  hCp://sExproject.github.io/supporters/	
  
Roadmap	
  
Security	
  Strategy	
  
• ConnecEng	
  Data	
  and	
  People	
  
Security	
  Posture	
  
• SituaEonal	
  Awareness	
  
Visual	
  Security	
  AnalyEcs	
  
• Contextual	
  Analysis	
  
Advanced	
  Threats	
  
• Knowledge	
  Sharing	
  and	
  AdopEon	
  
Insider	
  Threat	
  
Copyright	
  ©	
  2015	
  Splunk	
  Inc.	
  
DetecEng	
  Suspicious	
  User	
  AcEvity	
  
•  Spot	
  suspicious	
  user	
  acEvity	
  	
  
•  Malicious	
  insider	
  or	
  external	
  threat	
  using	
  stolen	
  credenEals	
  	
  
•  High	
  aggregate	
  risk	
  score	
  
•  Uploaded	
  data	
  to	
  non-­‐corp	
  sites	
  	
  
•  Emailed	
  data	
  to	
  non-­‐corp	
  domains	
  	
  
•  Visits	
  to	
  blacklisted	
  sites	
  	
  
•  Remote	
  access	
  	
  
•  Anomalous	
  help	
  desk	
  Ecket	
  	
  
Roadmap	
  
Security	
  Strategy	
  
• ConnecEng	
  Data	
  and	
  People	
  
Security	
  Posture	
  
• SituaEonal	
  Awareness	
  
Visual	
  Security	
  AnalyEcs	
  
• Contextual	
  Analysis	
  
Advanced	
  Threats	
  
• Knowledge	
  Sharing	
  and	
  AdopEon	
  
Insider	
  Threat	
  
• Stop	
  Data	
  Breaches	
  
Copyright	
  ©	
  2015	
  Splunk	
  Inc.	
  
Case	
  Study:	
  Telenor	
  
"   Challanges:	
  
–  Millions	
  of	
  customers,	
  thousands	
  of	
  servers	
  and	
  routers	
  
and	
  they	
  had	
  missing	
  details	
  in	
  operaEve	
  tasks.	
  
–  CommunicaEon	
  between	
  departments	
  was	
  challanging.	
  
–  Errors	
  and	
  issues	
  sporadically	
  slipped	
  unnoEced.	
  
"   Breakthroughs:	
  
–  Team	
  noEced	
  WebMail	
  accounts	
  being	
  abused	
  to	
  send	
  
hundreds	
  of	
  thousands	
  of	
  SMS	
  messages	
  abroad	
  
–  Baselining	
  normal	
  and	
  track	
  DeviaEon	
  
–  Understand	
  aCackers	
  and	
  their	
  behaviour	
  to	
  take	
  them	
  
down	
  proacEve.	
  	
  
Norway's largest
telecom services
provider

160 Mio mobile
subscribers globally
Copyright	
  ©	
  2015	
  Splunk	
  Inc.	
  
Thank	
  You!	
  
	
  
Q&A	
  

More Related Content

What's hot (20)

Splunk Enterprise Security
Splunk Enterprise SecuritySplunk Enterprise Security
Splunk Enterprise Security
Splunk
 
Building an Analytics Enables SOC
Building an Analytics Enables SOCBuilding an Analytics Enables SOC
Building an Analytics Enables SOC
Splunk
 
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security KeynoteSplunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk
 
Splunk for Enterprise Security Featuring UBA
Splunk for Enterprise Security Featuring UBASplunk for Enterprise Security Featuring UBA
Splunk for Enterprise Security Featuring UBA
Splunk
 
Building an Analytics - Enabled SOC Breakout Session
Building an Analytics - Enabled SOC Breakout Session Building an Analytics - Enabled SOC Breakout Session
Building an Analytics - Enabled SOC Breakout Session
Splunk
 
Splunk for Security-Hands On
Splunk for Security-Hands OnSplunk for Security-Hands On
Splunk for Security-Hands On
Splunk
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
IBM Danmark
 
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
Splunk
 
Splunk .conf2011: Splunk for Fraud and Forensics at Intuit
Splunk .conf2011: Splunk for Fraud and Forensics at IntuitSplunk .conf2011: Splunk for Fraud and Forensics at Intuit
Splunk .conf2011: Splunk for Fraud and Forensics at Intuit
Erin Sweeney
 
Splunk for Enterprise Security Featuring User Behavior Analytics
Splunk for Enterprise Security Featuring User Behavior Analytics Splunk for Enterprise Security Featuring User Behavior Analytics
Splunk for Enterprise Security Featuring User Behavior Analytics
Splunk
 
Enterprise Security featuring UBA
Enterprise Security featuring UBAEnterprise Security featuring UBA
Enterprise Security featuring UBA
Splunk
 
Splunk for Security: Background & Customer Case Study
Splunk for Security: Background & Customer Case StudySplunk for Security: Background & Customer Case Study
Splunk for Security: Background & Customer Case Study
Andrew Gerber
 
Security investigation hands-on workshop 2018
Security investigation hands-on workshop 2018Security investigation hands-on workshop 2018
Security investigation hands-on workshop 2018
YoungCho50
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
Splunk
 
Splunk for Security
Splunk for SecuritySplunk for Security
Splunk for Security
Gabrielle Knowles
 
Splunk workshop-Threat Hunting
Splunk workshop-Threat HuntingSplunk workshop-Threat Hunting
Splunk workshop-Threat Hunting
Splunk
 
Splunk Discovery: Warsaw 2018 - Reimagining IT with Service Intelligence
Splunk Discovery: Warsaw 2018 - Reimagining IT with Service IntelligenceSplunk Discovery: Warsaw 2018 - Reimagining IT with Service Intelligence
Splunk Discovery: Warsaw 2018 - Reimagining IT with Service Intelligence
Splunk
 
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics MethodsSplunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
Splunk
 
Splunk Discovery Dusseldorf: September 2017 - Security Session
Splunk Discovery Dusseldorf: September 2017 - Security SessionSplunk Discovery Dusseldorf: September 2017 - Security Session
Splunk Discovery Dusseldorf: September 2017 - Security Session
Splunk
 
Enterprise Security and User Behavior Analytics
Enterprise Security and User Behavior AnalyticsEnterprise Security and User Behavior Analytics
Enterprise Security and User Behavior Analytics
Splunk
 
Splunk Enterprise Security
Splunk Enterprise SecuritySplunk Enterprise Security
Splunk Enterprise Security
Splunk
 
Building an Analytics Enables SOC
Building an Analytics Enables SOCBuilding an Analytics Enables SOC
Building an Analytics Enables SOC
Splunk
 
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security KeynoteSplunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk
 
Splunk for Enterprise Security Featuring UBA
Splunk for Enterprise Security Featuring UBASplunk for Enterprise Security Featuring UBA
Splunk for Enterprise Security Featuring UBA
Splunk
 
Building an Analytics - Enabled SOC Breakout Session
Building an Analytics - Enabled SOC Breakout Session Building an Analytics - Enabled SOC Breakout Session
Building an Analytics - Enabled SOC Breakout Session
Splunk
 
Splunk for Security-Hands On
Splunk for Security-Hands OnSplunk for Security-Hands On
Splunk for Security-Hands On
Splunk
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
IBM Danmark
 
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
Splunk
 
Splunk .conf2011: Splunk for Fraud and Forensics at Intuit
Splunk .conf2011: Splunk for Fraud and Forensics at IntuitSplunk .conf2011: Splunk for Fraud and Forensics at Intuit
Splunk .conf2011: Splunk for Fraud and Forensics at Intuit
Erin Sweeney
 
Splunk for Enterprise Security Featuring User Behavior Analytics
Splunk for Enterprise Security Featuring User Behavior Analytics Splunk for Enterprise Security Featuring User Behavior Analytics
Splunk for Enterprise Security Featuring User Behavior Analytics
Splunk
 
Enterprise Security featuring UBA
Enterprise Security featuring UBAEnterprise Security featuring UBA
Enterprise Security featuring UBA
Splunk
 
Splunk for Security: Background & Customer Case Study
Splunk for Security: Background & Customer Case StudySplunk for Security: Background & Customer Case Study
Splunk for Security: Background & Customer Case Study
Andrew Gerber
 
Security investigation hands-on workshop 2018
Security investigation hands-on workshop 2018Security investigation hands-on workshop 2018
Security investigation hands-on workshop 2018
YoungCho50
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
Splunk
 
Splunk workshop-Threat Hunting
Splunk workshop-Threat HuntingSplunk workshop-Threat Hunting
Splunk workshop-Threat Hunting
Splunk
 
Splunk Discovery: Warsaw 2018 - Reimagining IT with Service Intelligence
Splunk Discovery: Warsaw 2018 - Reimagining IT with Service IntelligenceSplunk Discovery: Warsaw 2018 - Reimagining IT with Service Intelligence
Splunk Discovery: Warsaw 2018 - Reimagining IT with Service Intelligence
Splunk
 
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics MethodsSplunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
Splunk Discovery: Warsaw 2018 - Intro to Security Analytics Methods
Splunk
 
Splunk Discovery Dusseldorf: September 2017 - Security Session
Splunk Discovery Dusseldorf: September 2017 - Security SessionSplunk Discovery Dusseldorf: September 2017 - Security Session
Splunk Discovery Dusseldorf: September 2017 - Security Session
Splunk
 
Enterprise Security and User Behavior Analytics
Enterprise Security and User Behavior AnalyticsEnterprise Security and User Behavior Analytics
Enterprise Security and User Behavior Analytics
Splunk
 

Similar to Webinar: Neues zur Splunk App for Enterprise Security (20)

Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk
 
Splunk EMEA Webinar: Scoping infections and disrupting breaches
Splunk EMEA Webinar: Scoping infections and disrupting breachesSplunk EMEA Webinar: Scoping infections and disrupting breaches
Splunk EMEA Webinar: Scoping infections and disrupting breaches
Splunk
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk
 
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk
 
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...
Splunk
 
Operational Security
Operational SecurityOperational Security
Operational Security
Splunk
 
Splunk Webinar Best Practices für Incident Investigation
Splunk Webinar Best Practices für Incident InvestigationSplunk Webinar Best Practices für Incident Investigation
Splunk Webinar Best Practices für Incident Investigation
Georg Knon
 
Power the SOC of the Future with scale, speed and choice - Splunk Public Sect...
Power the SOC of the Future with scale, speed and choice - Splunk Public Sect...Power the SOC of the Future with scale, speed and choice - Splunk Public Sect...
Power the SOC of the Future with scale, speed and choice - Splunk Public Sect...
Splunk EMEA
 
The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018
The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018
The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018
Splunk
 
SplunkLive! Zürich - Splunk für Security
SplunkLive! Zürich - Splunk für SecuritySplunkLive! Zürich - Splunk für Security
SplunkLive! Zürich - Splunk für Security
Splunk
 
SplunkLive! Wien - Splunk für Security
SplunkLive! Wien - Splunk für SecuritySplunkLive! Wien - Splunk für Security
SplunkLive! Wien - Splunk für Security
Splunk
 
Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017
Adam Tice
 
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout Session
Splunk
 
Splunk conf2014 - Operationalizing Advanced Threat Defense
Splunk conf2014 - Operationalizing Advanced Threat DefenseSplunk conf2014 - Operationalizing Advanced Threat Defense
Splunk conf2014 - Operationalizing Advanced Threat Defense
Splunk
 
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOARPartner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
Splunk
 
SplunkLive! - Splunk for Security
SplunkLive! - Splunk for SecuritySplunkLive! - Splunk for Security
SplunkLive! - Splunk for Security
Splunk
 
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
Splunk
 
Operational Security Intelligence Breakout Session
Operational Security Intelligence Breakout SessionOperational Security Intelligence Breakout Session
Operational Security Intelligence Breakout Session
Splunk
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
Splunk
 
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk
 
Splunk EMEA Webinar: Scoping infections and disrupting breaches
Splunk EMEA Webinar: Scoping infections and disrupting breachesSplunk EMEA Webinar: Scoping infections and disrupting breaches
Splunk EMEA Webinar: Scoping infections and disrupting breaches
Splunk
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk
 
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk
 
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...
Splunk
 
Operational Security
Operational SecurityOperational Security
Operational Security
Splunk
 
Splunk Webinar Best Practices für Incident Investigation
Splunk Webinar Best Practices für Incident InvestigationSplunk Webinar Best Practices für Incident Investigation
Splunk Webinar Best Practices für Incident Investigation
Georg Knon
 
Power the SOC of the Future with scale, speed and choice - Splunk Public Sect...
Power the SOC of the Future with scale, speed and choice - Splunk Public Sect...Power the SOC of the Future with scale, speed and choice - Splunk Public Sect...
Power the SOC of the Future with scale, speed and choice - Splunk Public Sect...
Splunk EMEA
 
The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018
The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018
The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018
Splunk
 
SplunkLive! Zürich - Splunk für Security
SplunkLive! Zürich - Splunk für SecuritySplunkLive! Zürich - Splunk für Security
SplunkLive! Zürich - Splunk für Security
Splunk
 
SplunkLive! Wien - Splunk für Security
SplunkLive! Wien - Splunk für SecuritySplunkLive! Wien - Splunk für Security
SplunkLive! Wien - Splunk für Security
Splunk
 
Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017
Adam Tice
 
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout Session
Splunk
 
Splunk conf2014 - Operationalizing Advanced Threat Defense
Splunk conf2014 - Operationalizing Advanced Threat DefenseSplunk conf2014 - Operationalizing Advanced Threat Defense
Splunk conf2014 - Operationalizing Advanced Threat Defense
Splunk
 
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOARPartner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
Splunk
 
SplunkLive! - Splunk for Security
SplunkLive! - Splunk for SecuritySplunkLive! - Splunk for Security
SplunkLive! - Splunk for Security
Splunk
 
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
Splunk
 
Operational Security Intelligence Breakout Session
Operational Security Intelligence Breakout SessionOperational Security Intelligence Breakout Session
Operational Security Intelligence Breakout Session
Splunk
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
Splunk
 

More from Georg Knon (20)

Splunk Webinar: Verwandeln Sie Daten in wertvolle Erkenntnisse - Machine Lear...
Splunk Webinar: Verwandeln Sie Daten in wertvolle Erkenntnisse - Machine Lear...Splunk Webinar: Verwandeln Sie Daten in wertvolle Erkenntnisse - Machine Lear...
Splunk Webinar: Verwandeln Sie Daten in wertvolle Erkenntnisse - Machine Lear...
Georg Knon
 
Splunk Webinar: Mit Splunk SPL Maschinendaten durchsuchen, transformieren und...
Splunk Webinar: Mit Splunk SPL Maschinendaten durchsuchen, transformieren und...Splunk Webinar: Mit Splunk SPL Maschinendaten durchsuchen, transformieren und...
Splunk Webinar: Mit Splunk SPL Maschinendaten durchsuchen, transformieren und...
Georg Knon
 
SplunkLive! Zürich 2016 - Use Case Swisscom
SplunkLive! Zürich 2016 - Use Case SwisscomSplunkLive! Zürich 2016 - Use Case Swisscom
SplunkLive! Zürich 2016 - Use Case Swisscom
Georg Knon
 
SplunkLive! Zürich 2016 - Use Case Helvetia
SplunkLive! Zürich 2016 - Use Case HelvetiaSplunkLive! Zürich 2016 - Use Case Helvetia
SplunkLive! Zürich 2016 - Use Case Helvetia
Georg Knon
 
SplunkLive! Zürich 2016 - Use Case Adcubum
SplunkLive! Zürich 2016 - Use Case AdcubumSplunkLive! Zürich 2016 - Use Case Adcubum
SplunkLive! Zürich 2016 - Use Case Adcubum
Georg Knon
 
Splunk Webinar: Splunk für Application Management
Splunk Webinar: Splunk für Application ManagementSplunk Webinar: Splunk für Application Management
Splunk Webinar: Splunk für Application Management
Georg Knon
 
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Splunk Webinar: IT Operations Demo für Troubleshooting & DashboardingSplunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Georg Knon
 
Splunk for IT Operations Breakout Session
Splunk for IT Operations Breakout SessionSplunk for IT Operations Breakout Session
Splunk for IT Operations Breakout Session
Georg Knon
 
Getting started with Splunk - Break out Session
Getting started with Splunk - Break out SessionGetting started with Splunk - Break out Session
Getting started with Splunk - Break out Session
Georg Knon
 
Webinar Big Data zur Echtzeit-Betrugserkennung im eBanking nutzen mit Splunk ...
Webinar Big Data zur Echtzeit-Betrugserkennung im eBanking nutzen mit Splunk ...Webinar Big Data zur Echtzeit-Betrugserkennung im eBanking nutzen mit Splunk ...
Webinar Big Data zur Echtzeit-Betrugserkennung im eBanking nutzen mit Splunk ...
Georg Knon
 
Splunk Webinar: Verwandeln Sie Datensilos in Operational Intelligence
Splunk Webinar: Verwandeln Sie Datensilos in Operational IntelligenceSplunk Webinar: Verwandeln Sie Datensilos in Operational Intelligence
Splunk Webinar: Verwandeln Sie Datensilos in Operational Intelligence
Georg Knon
 
5 Möglichkeiten zur Verbesserung Ihrer Security
5 Möglichkeiten zur Verbesserung Ihrer Security5 Möglichkeiten zur Verbesserung Ihrer Security
5 Möglichkeiten zur Verbesserung Ihrer Security
Georg Knon
 
Splunk IT Service Intelligence
Splunk IT Service IntelligenceSplunk IT Service Intelligence
Splunk IT Service Intelligence
Georg Knon
 
Data models pivot with splunk break out session
Data models pivot with splunk break out sessionData models pivot with splunk break out session
Data models pivot with splunk break out session
Georg Knon
 
Splunk IT Service Intelligence
Splunk IT Service IntelligenceSplunk IT Service Intelligence
Splunk IT Service Intelligence
Georg Knon
 
Splunk Internet of Things Roundtable 2015
Splunk Internet of Things Roundtable 2015Splunk Internet of Things Roundtable 2015
Splunk Internet of Things Roundtable 2015
Georg Knon
 
Webinar splunk cloud saa s plattform für operational intelligence
Webinar splunk cloud   saa s plattform für operational intelligenceWebinar splunk cloud   saa s plattform für operational intelligence
Webinar splunk cloud saa s plattform für operational intelligence
Georg Knon
 
Splunk Webinar: Maschinendaten anreichern mit Informationen
Splunk Webinar: Maschinendaten anreichern mit InformationenSplunk Webinar: Maschinendaten anreichern mit Informationen
Splunk Webinar: Maschinendaten anreichern mit Informationen
Georg Knon
 
Splunk App for Stream - Einblicke in Ihren Netzwerkverkehr
Splunk App for Stream - Einblicke in Ihren NetzwerkverkehrSplunk App for Stream - Einblicke in Ihren Netzwerkverkehr
Splunk App for Stream - Einblicke in Ihren Netzwerkverkehr
Georg Knon
 
Webinar: Vulnerability Management leicht gemacht – mit Splunk und Qualys
Webinar: Vulnerability Management leicht gemacht – mit  Splunk und QualysWebinar: Vulnerability Management leicht gemacht – mit  Splunk und Qualys
Webinar: Vulnerability Management leicht gemacht – mit Splunk und Qualys
Georg Knon
 
Splunk Webinar: Verwandeln Sie Daten in wertvolle Erkenntnisse - Machine Lear...
Splunk Webinar: Verwandeln Sie Daten in wertvolle Erkenntnisse - Machine Lear...Splunk Webinar: Verwandeln Sie Daten in wertvolle Erkenntnisse - Machine Lear...
Splunk Webinar: Verwandeln Sie Daten in wertvolle Erkenntnisse - Machine Lear...
Georg Knon
 
Splunk Webinar: Mit Splunk SPL Maschinendaten durchsuchen, transformieren und...
Splunk Webinar: Mit Splunk SPL Maschinendaten durchsuchen, transformieren und...Splunk Webinar: Mit Splunk SPL Maschinendaten durchsuchen, transformieren und...
Splunk Webinar: Mit Splunk SPL Maschinendaten durchsuchen, transformieren und...
Georg Knon
 
SplunkLive! Zürich 2016 - Use Case Swisscom
SplunkLive! Zürich 2016 - Use Case SwisscomSplunkLive! Zürich 2016 - Use Case Swisscom
SplunkLive! Zürich 2016 - Use Case Swisscom
Georg Knon
 
SplunkLive! Zürich 2016 - Use Case Helvetia
SplunkLive! Zürich 2016 - Use Case HelvetiaSplunkLive! Zürich 2016 - Use Case Helvetia
SplunkLive! Zürich 2016 - Use Case Helvetia
Georg Knon
 
SplunkLive! Zürich 2016 - Use Case Adcubum
SplunkLive! Zürich 2016 - Use Case AdcubumSplunkLive! Zürich 2016 - Use Case Adcubum
SplunkLive! Zürich 2016 - Use Case Adcubum
Georg Knon
 
Splunk Webinar: Splunk für Application Management
Splunk Webinar: Splunk für Application ManagementSplunk Webinar: Splunk für Application Management
Splunk Webinar: Splunk für Application Management
Georg Knon
 
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Splunk Webinar: IT Operations Demo für Troubleshooting & DashboardingSplunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Georg Knon
 
Splunk for IT Operations Breakout Session
Splunk for IT Operations Breakout SessionSplunk for IT Operations Breakout Session
Splunk for IT Operations Breakout Session
Georg Knon
 
Getting started with Splunk - Break out Session
Getting started with Splunk - Break out SessionGetting started with Splunk - Break out Session
Getting started with Splunk - Break out Session
Georg Knon
 
Webinar Big Data zur Echtzeit-Betrugserkennung im eBanking nutzen mit Splunk ...
Webinar Big Data zur Echtzeit-Betrugserkennung im eBanking nutzen mit Splunk ...Webinar Big Data zur Echtzeit-Betrugserkennung im eBanking nutzen mit Splunk ...
Webinar Big Data zur Echtzeit-Betrugserkennung im eBanking nutzen mit Splunk ...
Georg Knon
 
Splunk Webinar: Verwandeln Sie Datensilos in Operational Intelligence
Splunk Webinar: Verwandeln Sie Datensilos in Operational IntelligenceSplunk Webinar: Verwandeln Sie Datensilos in Operational Intelligence
Splunk Webinar: Verwandeln Sie Datensilos in Operational Intelligence
Georg Knon
 
5 Möglichkeiten zur Verbesserung Ihrer Security
5 Möglichkeiten zur Verbesserung Ihrer Security5 Möglichkeiten zur Verbesserung Ihrer Security
5 Möglichkeiten zur Verbesserung Ihrer Security
Georg Knon
 
Splunk IT Service Intelligence
Splunk IT Service IntelligenceSplunk IT Service Intelligence
Splunk IT Service Intelligence
Georg Knon
 
Data models pivot with splunk break out session
Data models pivot with splunk break out sessionData models pivot with splunk break out session
Data models pivot with splunk break out session
Georg Knon
 
Splunk IT Service Intelligence
Splunk IT Service IntelligenceSplunk IT Service Intelligence
Splunk IT Service Intelligence
Georg Knon
 
Splunk Internet of Things Roundtable 2015
Splunk Internet of Things Roundtable 2015Splunk Internet of Things Roundtable 2015
Splunk Internet of Things Roundtable 2015
Georg Knon
 
Webinar splunk cloud saa s plattform für operational intelligence
Webinar splunk cloud   saa s plattform für operational intelligenceWebinar splunk cloud   saa s plattform für operational intelligence
Webinar splunk cloud saa s plattform für operational intelligence
Georg Knon
 
Splunk Webinar: Maschinendaten anreichern mit Informationen
Splunk Webinar: Maschinendaten anreichern mit InformationenSplunk Webinar: Maschinendaten anreichern mit Informationen
Splunk Webinar: Maschinendaten anreichern mit Informationen
Georg Knon
 
Splunk App for Stream - Einblicke in Ihren Netzwerkverkehr
Splunk App for Stream - Einblicke in Ihren NetzwerkverkehrSplunk App for Stream - Einblicke in Ihren Netzwerkverkehr
Splunk App for Stream - Einblicke in Ihren Netzwerkverkehr
Georg Knon
 
Webinar: Vulnerability Management leicht gemacht – mit Splunk und Qualys
Webinar: Vulnerability Management leicht gemacht – mit  Splunk und QualysWebinar: Vulnerability Management leicht gemacht – mit  Splunk und Qualys
Webinar: Vulnerability Management leicht gemacht – mit Splunk und Qualys
Georg Knon
 

Recently uploaded (20)

Adobe Master Collection CC Crack Advance Version 2025
Adobe Master Collection CC Crack Advance Version 2025Adobe Master Collection CC Crack Advance Version 2025
Adobe Master Collection CC Crack Advance Version 2025
kashifyounis067
 
Xforce Keygen 64-bit AutoCAD 2025 Crack
Xforce Keygen 64-bit AutoCAD 2025  CrackXforce Keygen 64-bit AutoCAD 2025  Crack
Xforce Keygen 64-bit AutoCAD 2025 Crack
usmanhidray
 
Adobe Photoshop CC 2025 Crack Full Serial Key With Latest
Adobe Photoshop CC 2025 Crack Full Serial Key  With LatestAdobe Photoshop CC 2025 Crack Full Serial Key  With Latest
Adobe Photoshop CC 2025 Crack Full Serial Key With Latest
usmanhidray
 
Shift Left using Lean for Agile Software Development
Shift Left using Lean for Agile Software DevelopmentShift Left using Lean for Agile Software Development
Shift Left using Lean for Agile Software Development
SathyaShankar6
 
Societal challenges of AI: biases, multilinguism and sustainability
Societal challenges of AI: biases, multilinguism and sustainabilitySocietal challenges of AI: biases, multilinguism and sustainability
Societal challenges of AI: biases, multilinguism and sustainability
Jordi Cabot
 
Adobe Marketo Engage Champion Deep Dive - SFDC CRM Synch V2 & Usage Dashboards
Adobe Marketo Engage Champion Deep Dive - SFDC CRM Synch V2 & Usage DashboardsAdobe Marketo Engage Champion Deep Dive - SFDC CRM Synch V2 & Usage Dashboards
Adobe Marketo Engage Champion Deep Dive - SFDC CRM Synch V2 & Usage Dashboards
BradBedford3
 
Agentic AI Use Cases using GenAI LLM models
Agentic AI Use Cases using GenAI LLM modelsAgentic AI Use Cases using GenAI LLM models
Agentic AI Use Cases using GenAI LLM models
Manish Chopra
 
PDF Reader Pro Crack Latest Version FREE Download 2025
PDF Reader Pro Crack Latest Version FREE Download 2025PDF Reader Pro Crack Latest Version FREE Download 2025
PDF Reader Pro Crack Latest Version FREE Download 2025
mu394968
 
Designing AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& ConsiderationsDesigning AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& Considerations
Dinusha Kumarasiri
 
Adobe Photoshop Lightroom CC 2025 Crack Latest Version
Adobe Photoshop Lightroom CC 2025 Crack Latest VersionAdobe Photoshop Lightroom CC 2025 Crack Latest Version
Adobe Photoshop Lightroom CC 2025 Crack Latest Version
usmanhidray
 
SketchUp Pro 2025 – The Ultimate 3D Design Solution for Professionals
SketchUp Pro 2025 – The Ultimate 3D Design Solution for ProfessionalsSketchUp Pro 2025 – The Ultimate 3D Design Solution for Professionals
SketchUp Pro 2025 – The Ultimate 3D Design Solution for Professionals
PI Software
 
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Eric D. Schabell
 
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
steaveroggers
 
Adobe Illustrator Crack | Free Download & Install Illustrator
Adobe Illustrator Crack | Free Download & Install IllustratorAdobe Illustrator Crack | Free Download & Install Illustrator
Adobe Illustrator Crack | Free Download & Install Illustrator
usmanhidray
 
Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.
Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.
Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.
Dele Amefo
 
Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]
saniaaftab72555
 
Scaling GraphRAG: Efficient Knowledge Retrieval for Enterprise AI
Scaling GraphRAG:  Efficient Knowledge Retrieval for Enterprise AIScaling GraphRAG:  Efficient Knowledge Retrieval for Enterprise AI
Scaling GraphRAG: Efficient Knowledge Retrieval for Enterprise AI
danshalev
 
Adobe Lightroom Classic Crack FREE Latest link 2025
Adobe Lightroom Classic Crack FREE Latest link 2025Adobe Lightroom Classic Crack FREE Latest link 2025
Adobe Lightroom Classic Crack FREE Latest link 2025
kashifyounis067
 
Revolutionizing Residential Wi-Fi PPT.pptx
Revolutionizing Residential Wi-Fi PPT.pptxRevolutionizing Residential Wi-Fi PPT.pptx
Revolutionizing Residential Wi-Fi PPT.pptx
nidhisingh691197
 
Solidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license codeSolidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license code
aneelaramzan63
 
Adobe Master Collection CC Crack Advance Version 2025
Adobe Master Collection CC Crack Advance Version 2025Adobe Master Collection CC Crack Advance Version 2025
Adobe Master Collection CC Crack Advance Version 2025
kashifyounis067
 
Xforce Keygen 64-bit AutoCAD 2025 Crack
Xforce Keygen 64-bit AutoCAD 2025  CrackXforce Keygen 64-bit AutoCAD 2025  Crack
Xforce Keygen 64-bit AutoCAD 2025 Crack
usmanhidray
 
Adobe Photoshop CC 2025 Crack Full Serial Key With Latest
Adobe Photoshop CC 2025 Crack Full Serial Key  With LatestAdobe Photoshop CC 2025 Crack Full Serial Key  With Latest
Adobe Photoshop CC 2025 Crack Full Serial Key With Latest
usmanhidray
 
Shift Left using Lean for Agile Software Development
Shift Left using Lean for Agile Software DevelopmentShift Left using Lean for Agile Software Development
Shift Left using Lean for Agile Software Development
SathyaShankar6
 
Societal challenges of AI: biases, multilinguism and sustainability
Societal challenges of AI: biases, multilinguism and sustainabilitySocietal challenges of AI: biases, multilinguism and sustainability
Societal challenges of AI: biases, multilinguism and sustainability
Jordi Cabot
 
Adobe Marketo Engage Champion Deep Dive - SFDC CRM Synch V2 & Usage Dashboards
Adobe Marketo Engage Champion Deep Dive - SFDC CRM Synch V2 & Usage DashboardsAdobe Marketo Engage Champion Deep Dive - SFDC CRM Synch V2 & Usage Dashboards
Adobe Marketo Engage Champion Deep Dive - SFDC CRM Synch V2 & Usage Dashboards
BradBedford3
 
Agentic AI Use Cases using GenAI LLM models
Agentic AI Use Cases using GenAI LLM modelsAgentic AI Use Cases using GenAI LLM models
Agentic AI Use Cases using GenAI LLM models
Manish Chopra
 
PDF Reader Pro Crack Latest Version FREE Download 2025
PDF Reader Pro Crack Latest Version FREE Download 2025PDF Reader Pro Crack Latest Version FREE Download 2025
PDF Reader Pro Crack Latest Version FREE Download 2025
mu394968
 
Designing AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& ConsiderationsDesigning AI-Powered APIs on Azure: Best Practices& Considerations
Designing AI-Powered APIs on Azure: Best Practices& Considerations
Dinusha Kumarasiri
 
Adobe Photoshop Lightroom CC 2025 Crack Latest Version
Adobe Photoshop Lightroom CC 2025 Crack Latest VersionAdobe Photoshop Lightroom CC 2025 Crack Latest Version
Adobe Photoshop Lightroom CC 2025 Crack Latest Version
usmanhidray
 
SketchUp Pro 2025 – The Ultimate 3D Design Solution for Professionals
SketchUp Pro 2025 – The Ultimate 3D Design Solution for ProfessionalsSketchUp Pro 2025 – The Ultimate 3D Design Solution for Professionals
SketchUp Pro 2025 – The Ultimate 3D Design Solution for Professionals
PI Software
 
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Mastering Fluent Bit: Ultimate Guide to Integrating Telemetry Pipelines with ...
Eric D. Schabell
 
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
How to Batch Export Lotus Notes NSF Emails to Outlook PST Easily?
steaveroggers
 
Adobe Illustrator Crack | Free Download & Install Illustrator
Adobe Illustrator Crack | Free Download & Install IllustratorAdobe Illustrator Crack | Free Download & Install Illustrator
Adobe Illustrator Crack | Free Download & Install Illustrator
usmanhidray
 
Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.
Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.
Salesforce Data Cloud- Hyperscale data platform, built for Salesforce.
Dele Amefo
 
Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]Get & Download Wondershare Filmora Crack Latest [2025]
Get & Download Wondershare Filmora Crack Latest [2025]
saniaaftab72555
 
Scaling GraphRAG: Efficient Knowledge Retrieval for Enterprise AI
Scaling GraphRAG:  Efficient Knowledge Retrieval for Enterprise AIScaling GraphRAG:  Efficient Knowledge Retrieval for Enterprise AI
Scaling GraphRAG: Efficient Knowledge Retrieval for Enterprise AI
danshalev
 
Adobe Lightroom Classic Crack FREE Latest link 2025
Adobe Lightroom Classic Crack FREE Latest link 2025Adobe Lightroom Classic Crack FREE Latest link 2025
Adobe Lightroom Classic Crack FREE Latest link 2025
kashifyounis067
 
Revolutionizing Residential Wi-Fi PPT.pptx
Revolutionizing Residential Wi-Fi PPT.pptxRevolutionizing Residential Wi-Fi PPT.pptx
Revolutionizing Residential Wi-Fi PPT.pptx
nidhisingh691197
 
Solidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license codeSolidworks Crack 2025 latest new + license code
Solidworks Crack 2025 latest new + license code
aneelaramzan63
 

Webinar: Neues zur Splunk App for Enterprise Security

  • 1. Copyright  ©  2015  Splunk  Inc.   The  Splunk  App  for   Enterprise  Security       Holger  Sesterhenn,   Sen.  Sales  Engineer,  CISSP     MaChias  Maier,     Security  Product  MarkeEng,  EMEA        
  • 2. 2   Ihr  Webcast  Team   Ma#hias  Maier   Security  Product  MarkeEng,  EMEA   [email protected]   Holger  Sesterhenn   Sen.  Sales  Engineer   [email protected]  
  • 3. Copyright  ©  2015  Splunk  Inc.   Safe  Harbor  Statement   During   the   course   of   this   presentaEon,   we   may   make   forward   looking   statements   regarding   future   events  or  the  expected  performance  of  the  company.  We  cauEon  you  that  such  statements  reflect  our   current  expectaEons  and  esEmates  based  on  factors  currently  known  to  us  and  that  actual  events  or   results  could  differ  materially.  For  important  factors  that  may  cause  actual  results  to  differ  from  those   contained  in  our  forward-­‐looking  statements,  please  review  our  filings  with  the  SEC.    The  forward-­‐looking   statements  made  in  this  presentaEon  are  being  made  as  of  the  Eme  and  date  of  its  live  presentaEon.   If  reviewed  aSer  its  live  presentaEon,  this  presentaEon  may  not  contain  current  or  accurate  informaEon.     We  do  not  assume  any  obligaEon  to  update  any  forward  looking  statements  we  may  make.  In  addiEon,   any  informaEon  about  our  roadmap  outlines  our  general  product  direcEon  and  is  subject  to  change  at   any  Eme  without  noEce.  It  is  for  informaEonal  purposes  only  and  shall  not  be  incorporated  into  any   contract   or   other   commitment.   Splunk   undertakes   no   obligaEon   either   to   develop   the   features   or   funcEonality  described  or  to  include  any  such  feature  or  funcEonality  in  a  future  release.  
  • 4. Copyright  ©  2015  Splunk  Inc.   How  Can  Splunk  Help?  
  • 5. Roadmap   Security  Strategy   Security  Posture   Visual  Security  AnalyEcs   Advanced  Threats   Insider  Threat  
  • 7. Source:  Mandiant  M-­‐Trends  Report  2012/2013/2014   67%   VicEms  noEfied   by  an  external   enEty   100%   Valid  credenEals   were  used   229   Median  #  of   days  before   detecEon   The  Ever-­‐Changing  Threat  Landscape  
  • 8. Copyright  ©  2015  Splunk  Inc.   Intrusion     DetecEon   Firewall   Data  Loss   PrevenEon   AnE-­‐Malware   Vulnerability   Scans   AuthenEcaEon   TradiEonal  Security  Strategy  
  • 9. Copyright  ©  2015  Splunk  Inc.   Connect  the  Dots  Across  All  Data   Servers   Storage   Desktops  Email   Web   TransacEon   Records   Network   Flows   Hypervisor   Custom   Apps   Physical   Access   Badges   Threat   Intelligence   Mobile   CMBD  DHCP/DNS   Intrusion     DetecEon   Firewall   Data  Loss   PrevenEon   AnE-­‐ Malware   Vulnerability   Scans   AuthenEcaEon  
  • 10. Copyright  ©  2015  Splunk  Inc.   ConnecEng  the  “Data  Dots”  via  MulEple/Dynamic  RelaEonships   Persist,  Repeat   Threat  Intelligence   Auth—User  Roles   Host     Ac@vity/Security   Network     Ac@vity/Security   ACacker,  know  relay/C2  sites,  infected  sites,  IOC,   aCack/campaign  intent  and  aCribuEon   Where  they  went  to,  who  talked  to  whom,  aCack   transmiCed,  abnormal  traffic,  malware  download   What  process  is  running  (malicious,  abnormal,  etc.)   Process  owner,  registry  mods,  aCack/malware   arEfacts,  patching  level,  aCack  suscepEbility   Access  level,  privileged  users,  likelihood  of  infecEon,   where  they  might  be  in  kill  chain     Delivery,  exploit   installa@on   Gain  trusted   access   Exfiltra@on  Data  gathering  Upgrade  (escalate)   lateral  movement   Persist,  repeat    
  • 11. AnalyEcs-­‐Driven  Security   Risk  Based   Context  and  Intelligence   ConnecEng  Data   and  People  
  • 12. Copyright  ©  2015  Splunk  Inc.   Sample  Nasdaq  -­‐  Heartbleed  
  • 13. Complement,  replace  and  go  beyond  tradi@onal  SIEMs   Security  Intelligence  Use  Cases   13   SECURITY  &                     COMPLIANCE   REPORTING   REAL-­‐TIME   MONITORING  OF   KNOWN  THREATS   MONITORING     OF  UNKNOWN   THREATS   INCIDENT   INVESTIGATIONS   &  FORENSICS   FRAUD     DETECTION   INSIDER     THREAT  
  • 14. Roadmap   Security  Strategy   • ConnecEng  Data  and  People   Security  Posture  
  • 15. 15   What’s  New  in  Splunk  App  for  Enterprise  Security  3.3   BeCer   DetecEon  of   Advanced   Threats   •  STIX/TAXII  &  OpenIOC   threat  intelligence   •  IOC/arEfacts  research   Improved   CollaboraEon   •  Export  correlaEon   searches,  KSIs,  swim  lanes   BeCer   DetecEon  of   Malicious   Insiders   •  User  acEvity  monitoring   dashboard  and  swim  lanes   •  Access  anomalies     Faster  Incident   Response   •  Added  funcEonality  to   Incident  Response  page   Benefit  Feature  
  • 16. Roadmap   Security  Strategy   • ConnecEng  Data  and  People   Security  Posture   • SituaEonal  Awareness   Visual  Security  AnalyEcs  
  • 17. Roadmap   Security  Strategy   • ConnecEng  Data  and  People   Security  Posture   • SituaEonal  Awareness   Visual  Security  AnalyEcs   • Contextual  Analysis   Advanced  Threats  
  • 18. Copyright  ©  2015  Splunk  Inc.   hCp://sExproject.github.io/about/    
  • 19. Copyright  ©  2015  Splunk  Inc.   STIX/TAXII  and  Open  IOC  101     •  Info  sharing  across  companies  and     industries     •  Standardized  XML   •  Contains  TTPs,  IOCs,  COA   •  IOCs  include  IPs,  web/e-­‐mail     domains,  hashes,  processes,     registry  key,  cerEficates     •  hCp://sExproject.github.io/about/  
  • 20. Copyright  ©  2015  Splunk  Inc.   Threat  Intelligence  in  Splunk  
  • 21. Copyright  ©  2015  Splunk  Inc.   TAXII  Services   Source:  hCp://hailataxii.com  
  • 22. Copyright  ©  2015  Splunk  Inc.   Sample  TAXII  Feeds   User  Community   Organisa@on   Cyber  Threat  XChange   Health  InformaEon  Trust  Alliance   Defense  Security  InformaEon  Exchange   Defense  Industrial  Base  InformaEon  and  Sharing   and  Analysis  OrganizaEon   ICS-­‐ISAC   Industrial  Control  System  InformaEon  Sharing  and   Analysis  Center   NH-­‐ISAC  NaEonal  Health  Cybersecurity   Intelligence  Planorm   NaEonal  Health  InformaEon  and  Analysis  Center   FS-­‐ISAC  /  Soltra  Edge   Financial  Services  InformaEon  Sharing  and   Analyses  Center  (FS-­‐ISAC)   Retail  Cyber  Intelligence  Sharing  Center,   Intelligence  Sharing  Portal   Retail  InformaEon  Sharing  and  Analysis  Center   (Retail-­‐ISAC)   More:  hCp://sExproject.github.io/supporters/  
  • 23. Roadmap   Security  Strategy   • ConnecEng  Data  and  People   Security  Posture   • SituaEonal  Awareness   Visual  Security  AnalyEcs   • Contextual  Analysis   Advanced  Threats   • Knowledge  Sharing  and  AdopEon   Insider  Threat  
  • 24. Copyright  ©  2015  Splunk  Inc.   DetecEng  Suspicious  User  AcEvity   •  Spot  suspicious  user  acEvity     •  Malicious  insider  or  external  threat  using  stolen  credenEals     •  High  aggregate  risk  score   •  Uploaded  data  to  non-­‐corp  sites     •  Emailed  data  to  non-­‐corp  domains     •  Visits  to  blacklisted  sites     •  Remote  access     •  Anomalous  help  desk  Ecket    
  • 25. Roadmap   Security  Strategy   • ConnecEng  Data  and  People   Security  Posture   • SituaEonal  Awareness   Visual  Security  AnalyEcs   • Contextual  Analysis   Advanced  Threats   • Knowledge  Sharing  and  AdopEon   Insider  Threat   • Stop  Data  Breaches  
  • 26. Copyright  ©  2015  Splunk  Inc.   Case  Study:  Telenor   "   Challanges:   –  Millions  of  customers,  thousands  of  servers  and  routers   and  they  had  missing  details  in  operaEve  tasks.   –  CommunicaEon  between  departments  was  challanging.   –  Errors  and  issues  sporadically  slipped  unnoEced.   "   Breakthroughs:   –  Team  noEced  WebMail  accounts  being  abused  to  send   hundreds  of  thousands  of  SMS  messages  abroad   –  Baselining  normal  and  track  DeviaEon   –  Understand  aCackers  and  their  behaviour  to  take  them   down  proacEve.     Norway's largest telecom services provider 160 Mio mobile subscribers globally
  • 27. Copyright  ©  2015  Splunk  Inc.   Thank  You!     Q&A