The document is a presentation on threat hunting with Splunk. It discusses threat hunting basics, data sources for threat hunting, knowing your endpoint, and the cyber kill chain model. It provides an agenda that includes a hands-on walkthrough of an attack scenario using Splunk's core capabilities. It also covers advanced threat hunting techniques and tools, enterprise security walkthroughs, and applying machine learning and data science to security.