This document discusses using Splunk as a security information and event management (SIEM) tool. It describes the author's role responding to security incidents at Cisco Systems, which has over 100,000 employees, 150,000 servers, and indexes almost 1 terabyte of log data daily. The document contrasts old approaches that relied on vendor-provided reports with new approaches like hunting for threats by building custom queries. It also discusses strategies for hunting versus gathering, with gathering meaning saving repeatable queries as reports or playbooks to enable automated detection of known threats.