SlideShare a Scribd company logo
© 2017 SPLUNK INC.
An End-To-End Approach: Detect via
Behavior and Respond via SIEM
MAY 11, 2017 | LONDON
Robert Farnod & Mark Small
© 2017 SPLUNK INC.
Goal for this session
Detect anomalies and identify data exfiltration using
ML, and visualize it over a Kill Chain
Showcase contextual information and stop data
exfiltration – this is the power of SSE, UBA, and ES
work together
Highlight the ability to write SPL and feed it to a
Machine Learning solution
2
1
3
© 2017 SPLUNK INC.
59% OF EMPLOYEES STEAL
PROPRIETARY CORPORATE DATA
WHEN THEY QUIT OR ARE FIRED.
DID YOU KNOW?
Source: Andra Zaharia. “10 Alarming Cyber Security Facts that Threaten Your Data.” Heimdal Security. 12 May 2016.
© 2017 SPLUNK INC.
Insider Threat?
© 2017 SPLUNK INC.
88% OF NETWORKS ARE
SUSCEPTIBLE TO PRIVILEGED
ACCOUNT HACKS.
DID YOU KNOW?
Source: Chris Brook. “88 Percent of Networks Susceptible to Privileged Account Hacks.” Threatpost. 10 November 2015.
© 2017 SPLUNK INC.
AS MANY AS 75% OF
BREACHES GO UNDISCOVERED
FOR WEEKS OR MONTHS.
DID YOU KNOW?
Source: Cody Cornell. “10 Facts Every Cyber Security Professional Should Know.” Swimlane. 19 April 2015
© 2017 SPLUNK INC.
SIEM: broad-scope monitoring
Intrusion detection and prevention
Data loss prevention via keywords
Identity access management
Endpoint protection platforms
From To
UEBA broad scope analytics
Network traffic analytics
Data exfiltration analytics
Identity analytics
Endpoint detection & response
Security Transformation
Source: The Fast-Evolving State of Security Analytics, Gartner, 2016.
© 2017 SPLUNK INC.
Three Focus Areas For Behavioral Detection
SIEM
NetworkEndpoint
© 2017 SPLUNK INC.
Use case(s) being addressed?
And techniques / methods being employed?
Data source required to address these use case(s)?
Things relevant to you.
© 2017 SPLUNK INC.
Use Cases
Detect compromised user
account
Detect compromised
endpoint
Detect data
exfiltration
Insider access abuse, including
privilege abuse
Provide information
for investigations
A
B
C
D
E
© 2017 SPLUNK INC.
Data Sources
Network
Endpoint
Server
Identity
Cloud App
Application
© 2017 SPLUNK INC.
Methods
Threshold Statistics Machine Learning
© 2017 SPLUNK INC.
Splunk Security Portfolio
Enterprise Security
Response
Splunk Enterprise
Detection
- Log Aggregation
- Splunk Security Essentials
- Rules, statistics, correlation
- Key security metrics
- Incident response workflow
- Adaptive response
Splunk UBA
Detection
- Risky behavior detection
- Entity profiling, scoring
- Kill chain, graph analysis
Realm of known Realm of unknown
Human-driven ML-driven
© 2017 SPLUNK INC.
SPLUNK
SECURITY
ESSENTIALS
SPLUNK
USER BEHAVIOR
ANALYTICS
SPLUNK
ENTERPRISE
SECURITY
© 2017 SPLUNK INC.
Highlight the ability to write a SPL and feed it to a
Machine Learning solution1
© 2017 SPLUNK INC.
Splunk Security Essentials
Detection Methods
Time series analysis
(with standard deviation)
First time analysis
(powered by stats)
General Splunk
searches
Detect insiders & advanced attackers in your environment
Download: https://splunkbase.splunk.com/app/3435/
© 2017 SPLUNK INC.
Demo
SPLUNK SECURITY ESSENTIALS
© 2017 SPLUNK INC.
Recap: What You Get With Splunk Security Essentials
50+ USE CASES
APPLICATION
LOGS
NETWORK
LOGS
ENDPOINT
LOGS
SERVER
LOGS
IDENTITY
LOGS
FIRST TIME LOGON TO
NEW SERVER
INCREASE IN PAGES
PRINTED
INCREASE IN
INTERACTIVE LOGONS
NEW AD DOMAIN
DETECTED
INCREASED IN # OF
HOST LOGGED IN TO
SPLUNK SECURITY
ESSENTIALS
Splunk Security Essentials offers
numerous use cases and is built out
on Splunk Enterprise for FREE.
▶ How would you automatically
stitch anomalies together into
threats and then visualize them
over a kill chain?
▶ How would you detect
UNKNOWN?
Now let’s extend the
use case
© 2017 SPLUNK INC.
Detect anomalies and identify data exfiltration using
ML, and visualize it over a Kill Chain
2
© 2017 SPLUNK INC.
SPLUNK
SECURITY
ESSENTIALS
SPLUNK
USER BEHAVIOR
ANALYTICS
SPLUNK
ENTERPRISE
SECURITY
© 2017 SPLUNK INC.
Splunk User Behavior Analytics
ANOMALOUS
BEHAVIOR
UNKNOWN
THREATS
© 2017 SPLUNK INC.
Splunk® UBA is an out-of-
the-box solution that helps
organizations find unknown
threats and anomalous
behavior with the use of
machine learning
WHAT IS SPLUNK UBA?
critical and actionable
unknown threats
© 2017 SPLUNK INC.
How Does Splunk UBA Work?
45+ ANOMALY
CLASSIFICATIONS
20+ THREAT
CLASSIFICATIONS
APPLICATION
LOGS
NETWORK
LOGS
ENDPOINT
LOGS
SERVER
LOGS
IDENTITY
LOGS
MACHINE
LEARNING
SUSPICIOUS DATA
MOVEMENT
UNUSUAL MACHINE
ACCESS
FLIGHT RISK USER
UNUSUAL NETWORK
ACTIVITY
MACHINE GENERATED
BEACON
MACHINE
LEARNING
LATERAL
MOVEMENT
SUSPICIOUS
BEHAVIOR
COMPROMISED
ACCOUNT
DATA
EXFILTRATION
MALWARE
ACTIVITY
© 2017 SPLUNK INC.
Insider Threat?
© 2017 SPLUNK INC.
Splunk User Behavioral Analytics Pillars
Five Foundational Pillars
Platform for Machine Data
Behavior Baseline &
Modelling
Unsupervised
Machine Learning
Real-Time & Big Data
Architecture
Anomaly Detection Threat Detection
© 2017 SPLUNK INC.
Demo
SPLUNK USER BEHAVIOR ANALYTICS
© 2017 SPLUNK INC.
SPLUNK UBA HELPS YOU WITH
Discovers abnormalities
and unknown threats,
which traditions
security products aren’t
designed to detect
Assists analysts with ML-
driven stitching of
hundreds of anomalies
into a single threat
Resource Amplification Visualization & Analytics
Kill-chain for threat
context and range of
analytics to understand
organizational baselines
Next Gen Detection
Better Detection FASTER INSIGHTHigher SOC Productivity
© 2017 SPLUNK INC.
Showcase contextual information and stop data
exfiltration – this is the power of SSE, UBA, and ES
work together
3
© 2017 SPLUNK INC.
SPLUNK
SECURITY
ESSENTIALS
SPLUNK
USER BEHAVIOR
ANALYTICS
SPLUNK
ENTERPRISE
SECURITY
© 2017 SPLUNK INC.
Splunk Enterprise Security
INCIDENT
INVESTIGATIONS
& FORENSICS
MONITORING
OF KNOWN
THREATS
SECURITY &
COMPLIANCE
REPORTING
© 2017 SPLUNK INC.
Splunk Analytics-Driven SIEM
MONITOR
REPORT
ANALYZE
INVESTIGATE
RESPONSE
COLLABORATE
DETECT
ALERT
ReportAd hoc
Search
AnalyzeCollect Store
Pre-defined
views and
rules
Analysis
investigation
& context
enrichment
Enterprise-
wide
coordination
& response
Correlation
rules,
thresholds
SIEM
Security ops management
alert & incident management,
policy based rules, out-of-box
security rules & analysis
DATA PLATFORM
Collect, Index data for search
and analysis, visualization.
Dynamic ad hoc and statistical
analysis
FUNCTIONS
© 2017 SPLUNK INC.
© 2017 SPLUNK INC.
Demo
SPLUNK ENTERPRISE SECURITY
© 2017 SPLUNK INC.
Splunk Security Portfolio
Enterprise Security
Response
Splunk Enterprise
Detection
- Log Aggregation
- Splunk Security Essentials
- Rules, statistics, correlation
- OOB key security metrics
- Incident response workflow
- Adaptive response
Splunk UBA
Detection
- Risky behavior detection
- Entity profiling, scoring
- Kill chain, graph analysis
Realm of known Realm of unknown
Human-driven ML-driven
© 2017 SPLUNK INC.
There is a solution
© 2017 SPLUNK INC.
© 2017 SPLUNK INC.
Gartner 2016 Magic Quadrant For SIEM*
*Gartner, Inc., 2016 Magic Quadrant for Security Information and Event Management, and Critical Capabilities for Security Information and Event Management, Oliver Rochford, Kelly M. Kavanagh, Toby Bussa. 10 August 2016 This graphic was
published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Splunk. Gartner does not endorse any vendor, product or service
depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should
not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
▶ Four years in a row as a leader
▶ Furthest overall in Completeness
of Vision
▶ Splunk also scores highest in
2016 Critical Capabilities for
SIEM report in all three Use Cases
© 2017 SPLUNK INC.
Go Get Started with Splunk Security Essentials!
● Download from apps.splunk.com
● Find use cases that match your needs
● Data Source Check shows other use cases for
your existing data
● Evaluate free tools to meet gaps, such as
Microsoft Sysmon
– (links inside the app)
© 2017 SPLUNK INC.
SEPT 25-28, 2017
Walter E. Washington Convention Center
Washington, D.C.
.conf2017
The 8th Annual Splunk Conference
conf.splunk.com
You will receive an email after registration
opens with a link to save over $450 on the
full conference rate.
You’ll have 30 days to take advantage of
this special promotional rate!
SAVE OVER $450
© 2017 SPLUNK INC.© 2017 SPLUNK INC.
Thank You
© 2017 SPLUNK INC.
Take the Survey on Pony Poll
ponypoll.com/slsf
Complete the survey for
your chance to win a
.conf2017 pass
Ad

More Related Content

What's hot (20)

The Hitchhiker's Guide to Service Intelligence
The Hitchhiker's Guide to Service IntelligenceThe Hitchhiker's Guide to Service Intelligence
The Hitchhiker's Guide to Service Intelligence
Splunk
 
Splunk Discovery Day Milwaukee 9-14-17
Splunk Discovery Day Milwaukee 9-14-17Splunk Discovery Day Milwaukee 9-14-17
Splunk Discovery Day Milwaukee 9-14-17
Splunk
 
Learn how to use an Analytics-Driven SIEM for your Security Operations
Learn how to use an Analytics-Driven SIEM for your Security OperationsLearn how to use an Analytics-Driven SIEM for your Security Operations
Learn how to use an Analytics-Driven SIEM for your Security Operations
Splunk
 
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with SplunkReactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
Splunk
 
Splunk Discovery Dusseldorf: September 2017 - IT Ops Session
Splunk Discovery Dusseldorf: September 2017 - IT Ops SessionSplunk Discovery Dusseldorf: September 2017 - IT Ops Session
Splunk Discovery Dusseldorf: September 2017 - IT Ops Session
Splunk
 
Danfoss - Splunk for Vulnerability Management
Danfoss - Splunk for Vulnerability ManagementDanfoss - Splunk for Vulnerability Management
Danfoss - Splunk for Vulnerability Management
Splunk
 
The Hitchhiker's Guide to Service Intelligence Workshop
The Hitchhiker's Guide to Service Intelligence WorkshopThe Hitchhiker's Guide to Service Intelligence Workshop
The Hitchhiker's Guide to Service Intelligence Workshop
Splunk
 
Splunk Discovery Brussels - September 2017
Splunk Discovery Brussels - September 2017Splunk Discovery Brussels - September 2017
Splunk Discovery Brussels - September 2017
Splunk
 
SplunkLive! London 2017 - Travis Perkins
SplunkLive! London 2017 - Travis PerkinsSplunkLive! London 2017 - Travis Perkins
SplunkLive! London 2017 - Travis Perkins
Splunk
 
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
Splunk
 
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with SplunkReactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
Splunk
 
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOARPartner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
Splunk
 
SplunkLive! Paris 2017: Plenary Session - Splunk Overview
SplunkLive! Paris 2017: Plenary Session - Splunk OverviewSplunkLive! Paris 2017: Plenary Session - Splunk Overview
SplunkLive! Paris 2017: Plenary Session - Splunk Overview
Splunk
 
Splunk Discovery: Milan 2018 - Delivering New Visibility and Analytics for IT...
Splunk Discovery: Milan 2018 - Delivering New Visibility and Analytics for IT...Splunk Discovery: Milan 2018 - Delivering New Visibility and Analytics for IT...
Splunk Discovery: Milan 2018 - Delivering New Visibility and Analytics for IT...
Splunk
 
The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018
The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018
The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018
Splunk
 
Splunk Forum Frankfurt - 15th Nov 2017 - Building SOC with Splunk
Splunk Forum Frankfurt - 15th Nov 2017 - Building SOC with SplunkSplunk Forum Frankfurt - 15th Nov 2017 - Building SOC with Splunk
Splunk Forum Frankfurt - 15th Nov 2017 - Building SOC with Splunk
Splunk
 
SplunkLive! London 2017 - Using Machine Learning to Feed Hungry People
SplunkLive! London 2017 - Using Machine Learning to Feed Hungry PeopleSplunkLive! London 2017 - Using Machine Learning to Feed Hungry People
SplunkLive! London 2017 - Using Machine Learning to Feed Hungry People
Splunk
 
Splunk Discovery Dusseldorf: September 2017 - Security Session
Splunk Discovery Dusseldorf: September 2017 - Security SessionSplunk Discovery Dusseldorf: September 2017 - Security Session
Splunk Discovery Dusseldorf: September 2017 - Security Session
Splunk
 
Splunk Forum Frankfurt - 15th Nov 2017 - .conf2017 Update
Splunk Forum Frankfurt - 15th Nov 2017 - .conf2017 UpdateSplunk Forum Frankfurt - 15th Nov 2017 - .conf2017 Update
Splunk Forum Frankfurt - 15th Nov 2017 - .conf2017 Update
Splunk
 
SplunkLive! London 2017 - DevOps Powered by Splunk
SplunkLive! London 2017 - DevOps Powered by SplunkSplunkLive! London 2017 - DevOps Powered by Splunk
SplunkLive! London 2017 - DevOps Powered by Splunk
Splunk
 
The Hitchhiker's Guide to Service Intelligence
The Hitchhiker's Guide to Service IntelligenceThe Hitchhiker's Guide to Service Intelligence
The Hitchhiker's Guide to Service Intelligence
Splunk
 
Splunk Discovery Day Milwaukee 9-14-17
Splunk Discovery Day Milwaukee 9-14-17Splunk Discovery Day Milwaukee 9-14-17
Splunk Discovery Day Milwaukee 9-14-17
Splunk
 
Learn how to use an Analytics-Driven SIEM for your Security Operations
Learn how to use an Analytics-Driven SIEM for your Security OperationsLearn how to use an Analytics-Driven SIEM for your Security Operations
Learn how to use an Analytics-Driven SIEM for your Security Operations
Splunk
 
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with SplunkReactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
Splunk
 
Splunk Discovery Dusseldorf: September 2017 - IT Ops Session
Splunk Discovery Dusseldorf: September 2017 - IT Ops SessionSplunk Discovery Dusseldorf: September 2017 - IT Ops Session
Splunk Discovery Dusseldorf: September 2017 - IT Ops Session
Splunk
 
Danfoss - Splunk for Vulnerability Management
Danfoss - Splunk for Vulnerability ManagementDanfoss - Splunk for Vulnerability Management
Danfoss - Splunk for Vulnerability Management
Splunk
 
The Hitchhiker's Guide to Service Intelligence Workshop
The Hitchhiker's Guide to Service Intelligence WorkshopThe Hitchhiker's Guide to Service Intelligence Workshop
The Hitchhiker's Guide to Service Intelligence Workshop
Splunk
 
Splunk Discovery Brussels - September 2017
Splunk Discovery Brussels - September 2017Splunk Discovery Brussels - September 2017
Splunk Discovery Brussels - September 2017
Splunk
 
SplunkLive! London 2017 - Travis Perkins
SplunkLive! London 2017 - Travis PerkinsSplunkLive! London 2017 - Travis Perkins
SplunkLive! London 2017 - Travis Perkins
Splunk
 
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
SplunkLive! London 2017 - Building an Analytics Driven Security Operation Cen...
Splunk
 
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with SplunkReactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with Splunk
Splunk
 
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOARPartner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
Splunk
 
SplunkLive! Paris 2017: Plenary Session - Splunk Overview
SplunkLive! Paris 2017: Plenary Session - Splunk OverviewSplunkLive! Paris 2017: Plenary Session - Splunk Overview
SplunkLive! Paris 2017: Plenary Session - Splunk Overview
Splunk
 
Splunk Discovery: Milan 2018 - Delivering New Visibility and Analytics for IT...
Splunk Discovery: Milan 2018 - Delivering New Visibility and Analytics for IT...Splunk Discovery: Milan 2018 - Delivering New Visibility and Analytics for IT...
Splunk Discovery: Milan 2018 - Delivering New Visibility and Analytics for IT...
Splunk
 
The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018
The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018
The Splunk AISecOps Initiative - Splunk Security Roundtable: Zurich 2018
Splunk
 
Splunk Forum Frankfurt - 15th Nov 2017 - Building SOC with Splunk
Splunk Forum Frankfurt - 15th Nov 2017 - Building SOC with SplunkSplunk Forum Frankfurt - 15th Nov 2017 - Building SOC with Splunk
Splunk Forum Frankfurt - 15th Nov 2017 - Building SOC with Splunk
Splunk
 
SplunkLive! London 2017 - Using Machine Learning to Feed Hungry People
SplunkLive! London 2017 - Using Machine Learning to Feed Hungry PeopleSplunkLive! London 2017 - Using Machine Learning to Feed Hungry People
SplunkLive! London 2017 - Using Machine Learning to Feed Hungry People
Splunk
 
Splunk Discovery Dusseldorf: September 2017 - Security Session
Splunk Discovery Dusseldorf: September 2017 - Security SessionSplunk Discovery Dusseldorf: September 2017 - Security Session
Splunk Discovery Dusseldorf: September 2017 - Security Session
Splunk
 
Splunk Forum Frankfurt - 15th Nov 2017 - .conf2017 Update
Splunk Forum Frankfurt - 15th Nov 2017 - .conf2017 UpdateSplunk Forum Frankfurt - 15th Nov 2017 - .conf2017 Update
Splunk Forum Frankfurt - 15th Nov 2017 - .conf2017 Update
Splunk
 
SplunkLive! London 2017 - DevOps Powered by Splunk
SplunkLive! London 2017 - DevOps Powered by SplunkSplunkLive! London 2017 - DevOps Powered by Splunk
SplunkLive! London 2017 - DevOps Powered by Splunk
Splunk
 

Similar to SplunkLive! London 2017 - An End-To-End Approach: Detect via Behavious and Respond vis SIEM (20)

Splunk live nyc_2017_sec_buildinganalyticsdrivensoc
Splunk live nyc_2017_sec_buildinganalyticsdrivensocSplunk live nyc_2017_sec_buildinganalyticsdrivensoc
Splunk live nyc_2017_sec_buildinganalyticsdrivensoc
Rene Aguero
 
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security KeynoteSplunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk
 
Using Machine Learning and Analytics to Hunt for Security Threats - Webinar
Using Machine Learning and Analytics to Hunt for Security Threats - WebinarUsing Machine Learning and Analytics to Hunt for Security Threats - Webinar
Using Machine Learning and Analytics to Hunt for Security Threats - Webinar
Splunk
 
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
Splunk
 
Splunk Discovery: Milan 2018 - Get More From Your Machine Data with Splunk AI
Splunk Discovery: Milan 2018 - Get More From Your Machine Data with Splunk AISplunk Discovery: Milan 2018 - Get More From Your Machine Data with Splunk AI
Splunk Discovery: Milan 2018 - Get More From Your Machine Data with Splunk AI
Splunk
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk
 
Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017
Adam Tice
 
Splunk for Enterprise Security and User Behavior Analytics
 Splunk for Enterprise Security and User Behavior Analytics Splunk for Enterprise Security and User Behavior Analytics
Splunk for Enterprise Security and User Behavior Analytics
Splunk
 
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
Splunk
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk
 
Splunk for Enterprise Security Featuring UBA
Splunk for Enterprise Security Featuring UBASplunk for Enterprise Security Featuring UBA
Splunk for Enterprise Security Featuring UBA
Splunk
 
Splunk for AIOps: Reduce IT outages through prediction with machine learning
Splunk for AIOps: Reduce IT outages through prediction with machine learningSplunk for AIOps: Reduce IT outages through prediction with machine learning
Splunk for AIOps: Reduce IT outages through prediction with machine learning
Digital Transformation EXPO Event Series
 
Splunk-Presentation
Splunk-Presentation Splunk-Presentation
Splunk-Presentation
PrasadThorat23
 
Enterprise Security and User Behavior Analytics
Enterprise Security and User Behavior AnalyticsEnterprise Security and User Behavior Analytics
Enterprise Security and User Behavior Analytics
Splunk
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk
 
AIOps Roundtable Munich 2018: Intro to Splunk's ML Technologies
AIOps Roundtable Munich 2018: Intro to Splunk's ML TechnologiesAIOps Roundtable Munich 2018: Intro to Splunk's ML Technologies
AIOps Roundtable Munich 2018: Intro to Splunk's ML Technologies
Splunk
 
Splunk workshop-Threat Hunting
Splunk workshop-Threat HuntingSplunk workshop-Threat Hunting
Splunk workshop-Threat Hunting
Splunk
 
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk
 
Splunk for Enterprise Security featuring UBA
Splunk for Enterprise Security featuring UBA Splunk for Enterprise Security featuring UBA
Splunk for Enterprise Security featuring UBA
Splunk
 
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk
 
Splunk live nyc_2017_sec_buildinganalyticsdrivensoc
Splunk live nyc_2017_sec_buildinganalyticsdrivensocSplunk live nyc_2017_sec_buildinganalyticsdrivensoc
Splunk live nyc_2017_sec_buildinganalyticsdrivensoc
Rene Aguero
 
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security KeynoteSplunk Discovery Day Dubai 2017 - Security Keynote
Splunk Discovery Day Dubai 2017 - Security Keynote
Splunk
 
Using Machine Learning and Analytics to Hunt for Security Threats - Webinar
Using Machine Learning and Analytics to Hunt for Security Threats - WebinarUsing Machine Learning and Analytics to Hunt for Security Threats - Webinar
Using Machine Learning and Analytics to Hunt for Security Threats - Webinar
Splunk
 
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
Splunk
 
Splunk Discovery: Milan 2018 - Get More From Your Machine Data with Splunk AI
Splunk Discovery: Milan 2018 - Get More From Your Machine Data with Splunk AISplunk Discovery: Milan 2018 - Get More From Your Machine Data with Splunk AI
Splunk Discovery: Milan 2018 - Get More From Your Machine Data with Splunk AI
Splunk
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk
 
Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017Security crawl walk run presentation mckay v1 2017
Security crawl walk run presentation mckay v1 2017
Adam Tice
 
Splunk for Enterprise Security and User Behavior Analytics
 Splunk for Enterprise Security and User Behavior Analytics Splunk for Enterprise Security and User Behavior Analytics
Splunk for Enterprise Security and User Behavior Analytics
Splunk
 
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
SplunkLive! Zurich 2018: Use Splunk for Incident Response, Orchestration and ...
Splunk
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk
 
Splunk for Enterprise Security Featuring UBA
Splunk for Enterprise Security Featuring UBASplunk for Enterprise Security Featuring UBA
Splunk for Enterprise Security Featuring UBA
Splunk
 
Splunk for AIOps: Reduce IT outages through prediction with machine learning
Splunk for AIOps: Reduce IT outages through prediction with machine learningSplunk for AIOps: Reduce IT outages through prediction with machine learning
Splunk for AIOps: Reduce IT outages through prediction with machine learning
Digital Transformation EXPO Event Series
 
Enterprise Security and User Behavior Analytics
Enterprise Security and User Behavior AnalyticsEnterprise Security and User Behavior Analytics
Enterprise Security and User Behavior Analytics
Splunk
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk
 
AIOps Roundtable Munich 2018: Intro to Splunk's ML Technologies
AIOps Roundtable Munich 2018: Intro to Splunk's ML TechnologiesAIOps Roundtable Munich 2018: Intro to Splunk's ML Technologies
AIOps Roundtable Munich 2018: Intro to Splunk's ML Technologies
Splunk
 
Splunk workshop-Threat Hunting
Splunk workshop-Threat HuntingSplunk workshop-Threat Hunting
Splunk workshop-Threat Hunting
Splunk
 
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk
 
Splunk for Enterprise Security featuring UBA
Splunk for Enterprise Security featuring UBA Splunk for Enterprise Security featuring UBA
Splunk for Enterprise Security featuring UBA
Splunk
 
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk
 
Ad

More from Splunk (20)

Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
Building Resilience with Energy Management for the Public Sector
Building Resilience with Energy Management for the Public SectorBuilding Resilience with Energy Management for the Public Sector
Building Resilience with Energy Management for the Public Sector
Splunk
 
IT-Lagebild: Observability for Resilience (SVA)
IT-Lagebild: Observability for Resilience (SVA)IT-Lagebild: Observability for Resilience (SVA)
IT-Lagebild: Observability for Resilience (SVA)
Splunk
 
Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)
Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)
Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)
Splunk
 
Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)
Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)
Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)
Splunk
 
Praktische Erfahrungen mit dem Attack Analyser (gematik)
Praktische Erfahrungen mit dem Attack Analyser (gematik)Praktische Erfahrungen mit dem Attack Analyser (gematik)
Praktische Erfahrungen mit dem Attack Analyser (gematik)
Splunk
 
Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)
Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)
Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)
Splunk
 
Security - Mit Sicherheit zum Erfolg (Telekom)
Security - Mit Sicherheit zum Erfolg (Telekom)Security - Mit Sicherheit zum Erfolg (Telekom)
Security - Mit Sicherheit zum Erfolg (Telekom)
Splunk
 
One Cisco - Splunk Public Sector Summit Germany April 2025
One Cisco - Splunk Public Sector Summit Germany April 2025One Cisco - Splunk Public Sector Summit Germany April 2025
One Cisco - Splunk Public Sector Summit Germany April 2025
Splunk
 
.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine
Splunk
 
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
Splunk
 
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica).conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
Splunk
 
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International
Splunk
 
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett .conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
Splunk
 
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär).conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
Splunk
 
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu....conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
Splunk
 
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever....conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
Splunk
 
.conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex).conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex)
Splunk
 
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
Splunk
 
Splunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk
 
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update | Public Sector Summit Germany 2025
Splunk
 
Building Resilience with Energy Management for the Public Sector
Building Resilience with Energy Management for the Public SectorBuilding Resilience with Energy Management for the Public Sector
Building Resilience with Energy Management for the Public Sector
Splunk
 
IT-Lagebild: Observability for Resilience (SVA)
IT-Lagebild: Observability for Resilience (SVA)IT-Lagebild: Observability for Resilience (SVA)
IT-Lagebild: Observability for Resilience (SVA)
Splunk
 
Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)
Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)
Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)
Splunk
 
Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)
Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)
Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)
Splunk
 
Praktische Erfahrungen mit dem Attack Analyser (gematik)
Praktische Erfahrungen mit dem Attack Analyser (gematik)Praktische Erfahrungen mit dem Attack Analyser (gematik)
Praktische Erfahrungen mit dem Attack Analyser (gematik)
Splunk
 
Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)
Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)
Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)
Splunk
 
Security - Mit Sicherheit zum Erfolg (Telekom)
Security - Mit Sicherheit zum Erfolg (Telekom)Security - Mit Sicherheit zum Erfolg (Telekom)
Security - Mit Sicherheit zum Erfolg (Telekom)
Splunk
 
One Cisco - Splunk Public Sector Summit Germany April 2025
One Cisco - Splunk Public Sector Summit Germany April 2025One Cisco - Splunk Public Sector Summit Germany April 2025
One Cisco - Splunk Public Sector Summit Germany April 2025
Splunk
 
.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine
Splunk
 
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
Splunk
 
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica).conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
Splunk
 
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International
Splunk
 
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett .conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
Splunk
 
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär).conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
Splunk
 
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu....conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
Splunk
 
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever....conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
Splunk
 
.conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex).conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex)
Splunk
 
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
Splunk
 
Splunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk
 
Ad

Recently uploaded (20)

ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
Transcript: #StandardsGoals for 2025: Standards & certification roundup - Tec...
BookNet Canada
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 

SplunkLive! London 2017 - An End-To-End Approach: Detect via Behavious and Respond vis SIEM

  • 1. © 2017 SPLUNK INC. An End-To-End Approach: Detect via Behavior and Respond via SIEM MAY 11, 2017 | LONDON Robert Farnod & Mark Small
  • 2. © 2017 SPLUNK INC. Goal for this session Detect anomalies and identify data exfiltration using ML, and visualize it over a Kill Chain Showcase contextual information and stop data exfiltration – this is the power of SSE, UBA, and ES work together Highlight the ability to write SPL and feed it to a Machine Learning solution 2 1 3
  • 3. © 2017 SPLUNK INC. 59% OF EMPLOYEES STEAL PROPRIETARY CORPORATE DATA WHEN THEY QUIT OR ARE FIRED. DID YOU KNOW? Source: Andra Zaharia. “10 Alarming Cyber Security Facts that Threaten Your Data.” Heimdal Security. 12 May 2016.
  • 4. © 2017 SPLUNK INC. Insider Threat?
  • 5. © 2017 SPLUNK INC. 88% OF NETWORKS ARE SUSCEPTIBLE TO PRIVILEGED ACCOUNT HACKS. DID YOU KNOW? Source: Chris Brook. “88 Percent of Networks Susceptible to Privileged Account Hacks.” Threatpost. 10 November 2015.
  • 6. © 2017 SPLUNK INC. AS MANY AS 75% OF BREACHES GO UNDISCOVERED FOR WEEKS OR MONTHS. DID YOU KNOW? Source: Cody Cornell. “10 Facts Every Cyber Security Professional Should Know.” Swimlane. 19 April 2015
  • 7. © 2017 SPLUNK INC. SIEM: broad-scope monitoring Intrusion detection and prevention Data loss prevention via keywords Identity access management Endpoint protection platforms From To UEBA broad scope analytics Network traffic analytics Data exfiltration analytics Identity analytics Endpoint detection & response Security Transformation Source: The Fast-Evolving State of Security Analytics, Gartner, 2016.
  • 8. © 2017 SPLUNK INC. Three Focus Areas For Behavioral Detection SIEM NetworkEndpoint
  • 9. © 2017 SPLUNK INC. Use case(s) being addressed? And techniques / methods being employed? Data source required to address these use case(s)? Things relevant to you.
  • 10. © 2017 SPLUNK INC. Use Cases Detect compromised user account Detect compromised endpoint Detect data exfiltration Insider access abuse, including privilege abuse Provide information for investigations A B C D E
  • 11. © 2017 SPLUNK INC. Data Sources Network Endpoint Server Identity Cloud App Application
  • 12. © 2017 SPLUNK INC. Methods Threshold Statistics Machine Learning
  • 13. © 2017 SPLUNK INC. Splunk Security Portfolio Enterprise Security Response Splunk Enterprise Detection - Log Aggregation - Splunk Security Essentials - Rules, statistics, correlation - Key security metrics - Incident response workflow - Adaptive response Splunk UBA Detection - Risky behavior detection - Entity profiling, scoring - Kill chain, graph analysis Realm of known Realm of unknown Human-driven ML-driven
  • 14. © 2017 SPLUNK INC. SPLUNK SECURITY ESSENTIALS SPLUNK USER BEHAVIOR ANALYTICS SPLUNK ENTERPRISE SECURITY
  • 15. © 2017 SPLUNK INC. Highlight the ability to write a SPL and feed it to a Machine Learning solution1
  • 16. © 2017 SPLUNK INC. Splunk Security Essentials Detection Methods Time series analysis (with standard deviation) First time analysis (powered by stats) General Splunk searches Detect insiders & advanced attackers in your environment Download: https://splunkbase.splunk.com/app/3435/
  • 17. © 2017 SPLUNK INC. Demo SPLUNK SECURITY ESSENTIALS
  • 18. © 2017 SPLUNK INC. Recap: What You Get With Splunk Security Essentials 50+ USE CASES APPLICATION LOGS NETWORK LOGS ENDPOINT LOGS SERVER LOGS IDENTITY LOGS FIRST TIME LOGON TO NEW SERVER INCREASE IN PAGES PRINTED INCREASE IN INTERACTIVE LOGONS NEW AD DOMAIN DETECTED INCREASED IN # OF HOST LOGGED IN TO SPLUNK SECURITY ESSENTIALS Splunk Security Essentials offers numerous use cases and is built out on Splunk Enterprise for FREE. ▶ How would you automatically stitch anomalies together into threats and then visualize them over a kill chain? ▶ How would you detect UNKNOWN? Now let’s extend the use case
  • 19. © 2017 SPLUNK INC. Detect anomalies and identify data exfiltration using ML, and visualize it over a Kill Chain 2
  • 20. © 2017 SPLUNK INC. SPLUNK SECURITY ESSENTIALS SPLUNK USER BEHAVIOR ANALYTICS SPLUNK ENTERPRISE SECURITY
  • 21. © 2017 SPLUNK INC. Splunk User Behavior Analytics ANOMALOUS BEHAVIOR UNKNOWN THREATS
  • 22. © 2017 SPLUNK INC. Splunk® UBA is an out-of- the-box solution that helps organizations find unknown threats and anomalous behavior with the use of machine learning WHAT IS SPLUNK UBA? critical and actionable unknown threats
  • 23. © 2017 SPLUNK INC. How Does Splunk UBA Work? 45+ ANOMALY CLASSIFICATIONS 20+ THREAT CLASSIFICATIONS APPLICATION LOGS NETWORK LOGS ENDPOINT LOGS SERVER LOGS IDENTITY LOGS MACHINE LEARNING SUSPICIOUS DATA MOVEMENT UNUSUAL MACHINE ACCESS FLIGHT RISK USER UNUSUAL NETWORK ACTIVITY MACHINE GENERATED BEACON MACHINE LEARNING LATERAL MOVEMENT SUSPICIOUS BEHAVIOR COMPROMISED ACCOUNT DATA EXFILTRATION MALWARE ACTIVITY
  • 24. © 2017 SPLUNK INC. Insider Threat?
  • 25. © 2017 SPLUNK INC. Splunk User Behavioral Analytics Pillars Five Foundational Pillars Platform for Machine Data Behavior Baseline & Modelling Unsupervised Machine Learning Real-Time & Big Data Architecture Anomaly Detection Threat Detection
  • 26. © 2017 SPLUNK INC. Demo SPLUNK USER BEHAVIOR ANALYTICS
  • 27. © 2017 SPLUNK INC. SPLUNK UBA HELPS YOU WITH Discovers abnormalities and unknown threats, which traditions security products aren’t designed to detect Assists analysts with ML- driven stitching of hundreds of anomalies into a single threat Resource Amplification Visualization & Analytics Kill-chain for threat context and range of analytics to understand organizational baselines Next Gen Detection Better Detection FASTER INSIGHTHigher SOC Productivity
  • 28. © 2017 SPLUNK INC. Showcase contextual information and stop data exfiltration – this is the power of SSE, UBA, and ES work together 3
  • 29. © 2017 SPLUNK INC. SPLUNK SECURITY ESSENTIALS SPLUNK USER BEHAVIOR ANALYTICS SPLUNK ENTERPRISE SECURITY
  • 30. © 2017 SPLUNK INC. Splunk Enterprise Security INCIDENT INVESTIGATIONS & FORENSICS MONITORING OF KNOWN THREATS SECURITY & COMPLIANCE REPORTING
  • 31. © 2017 SPLUNK INC. Splunk Analytics-Driven SIEM MONITOR REPORT ANALYZE INVESTIGATE RESPONSE COLLABORATE DETECT ALERT ReportAd hoc Search AnalyzeCollect Store Pre-defined views and rules Analysis investigation & context enrichment Enterprise- wide coordination & response Correlation rules, thresholds SIEM Security ops management alert & incident management, policy based rules, out-of-box security rules & analysis DATA PLATFORM Collect, Index data for search and analysis, visualization. Dynamic ad hoc and statistical analysis FUNCTIONS
  • 33. © 2017 SPLUNK INC. Demo SPLUNK ENTERPRISE SECURITY
  • 34. © 2017 SPLUNK INC. Splunk Security Portfolio Enterprise Security Response Splunk Enterprise Detection - Log Aggregation - Splunk Security Essentials - Rules, statistics, correlation - OOB key security metrics - Incident response workflow - Adaptive response Splunk UBA Detection - Risky behavior detection - Entity profiling, scoring - Kill chain, graph analysis Realm of known Realm of unknown Human-driven ML-driven
  • 35. © 2017 SPLUNK INC. There is a solution
  • 37. © 2017 SPLUNK INC. Gartner 2016 Magic Quadrant For SIEM* *Gartner, Inc., 2016 Magic Quadrant for Security Information and Event Management, and Critical Capabilities for Security Information and Event Management, Oliver Rochford, Kelly M. Kavanagh, Toby Bussa. 10 August 2016 This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Splunk. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. ▶ Four years in a row as a leader ▶ Furthest overall in Completeness of Vision ▶ Splunk also scores highest in 2016 Critical Capabilities for SIEM report in all three Use Cases
  • 38. © 2017 SPLUNK INC. Go Get Started with Splunk Security Essentials! ● Download from apps.splunk.com ● Find use cases that match your needs ● Data Source Check shows other use cases for your existing data ● Evaluate free tools to meet gaps, such as Microsoft Sysmon – (links inside the app)
  • 39. © 2017 SPLUNK INC. SEPT 25-28, 2017 Walter E. Washington Convention Center Washington, D.C. .conf2017 The 8th Annual Splunk Conference conf.splunk.com You will receive an email after registration opens with a link to save over $450 on the full conference rate. You’ll have 30 days to take advantage of this special promotional rate! SAVE OVER $450
  • 40. © 2017 SPLUNK INC.© 2017 SPLUNK INC. Thank You
  • 41. © 2017 SPLUNK INC. Take the Survey on Pony Poll ponypoll.com/slsf Complete the survey for your chance to win a .conf2017 pass

Editor's Notes

  • #2: Hello All Welcome, thanks for coming today and choosing to listen in to this session. MY name is Robert Farnod I'm a security Specialist in the for Splunk and tMark is one of our top security SE’s who will be showing you hands on some of our securty products today. So, today we will be speaking to you about how splunk provide -An End-To-End security Approach: Detect via Behavior and Respond via SIEM We have had a slight name change to the session you signed up to but the content is mostly the same!
  • #3: So the goals of the session Tody wewill highlight how splunks core SPL language allows you to detect behavior based monitoring and alerting and feed that into a ML solution Detect anomalies and identify data exfiltration using ML, translate those anomalies to real threats and visualize over the kill chain. Showcase how to use security essitials app, UBA product and ES working together, use contextual information and ultimately stop data exfiltration.
  • #4: Not only external acttacks you need to be worried about. Insider threat is very real, and you need to be proactive to gain visibility of what’s happening in your organisation. Employees best assets and weakest link.
  • #6: The majority of successful compromises need some form of privileged corporate access at some point. This means the keys of the kingdom, Your highly privileged accounts, should be closely monitored.
  • #7: Why ? Because its difficult to detect some of these attacks, especially the llong and and slow attacks. How can you do it? Traditional alerting may not have the scope to put an event from 3 months ago with an event that juts happened today. If you try you’ll end up either alertng on far too much and taking too much resource or not alerting on anything at all. By the time it takes to realize a breach, a lot of damaged has likely already been done.
  • #8: This slide shows the trend of how the industry is transforming - moving to a deeper more analytical approach. Siem ++, analyzing Packet data then just responding to tradition ids alarms, focusing on automating or preparing to implement fast response procedures.
  • #9: WHAT IS AN ENTITY? An entity can be a user, device, application, service account, file and so on. WHAT IS BEHAVIOR CENTRIC DETECTION? Learning from entity’s activity and calling it ‘Normal’. Then observing deviation from this Normal and alerting on it. The deviations can be off an entity’s baseline or its peer group baseline.
  • #10: 1)What use cases do you want to address? Do these align to to your business objectives? What uses cases does any product you are looking at deliver? 2) What data sources are needed to solve these use cases? Info must exist! 3) what techniques /methods are being employed, how far to the methods really go?
  • #11: High level uses cases we have grouped together here: 5)Provide a platform for incident investigation
  • #12: User identity and Device info from CMDB for example Drop Box, Box are examples of Cloud App and so is Office 365. We detect anomalies and threats against those, login failure, email to self, etc. Apllication logs DNS, DNS tunneling link back?? Essentaiil All Dat is sceutitu relevant
  • #13: Stats vs ML explanation High level Methods? First is the traditional alerting ,thresholds, custom reporting Next level is starting to look for anomalous behaviour using staticitcs like standard dev. The most advanced method is to start using machine learning to to start finding the unknown threats that deviate from the baseline of normal.
  • #14: This is a high level overview of the Splunk security portfolio which we will be discussing today. The realm of known Splunk Enterprise core platform Human driven, you decide what to look for. Rules and statistical analysis. Including Sec essentials which we will discuss in a bit The realm of unknown Splunk UBA which is unsupervised Machine Learning Driven analysis Entity Baselining Anomalous behavior These both feed into Enterprise Sec which is your premium SIEM ++ security platform provides management dashboard to understand your risk, workflow to track your investigations, enrichment data to give further insight adaptive repsonse to automate and integrate with partners.
  • #15: So now we move on to talk about that Sec Ess app I mentioned earlier and goal 1!
  • #16: Start our first goal! Highlight the ability to write a SPL and feed it to a Machine Learning solution
  • #17: So what is it The app provides over 50 working examples of User and entity behavior analysis just using core Splunk SPL, Also included is demo data so you can understand how these work straight away. It does things like First Time analysis. – IS this the first time this user has ever logged on to a specific server? Time series analysis, is one of the bad guys changing many more file names than usual to evade detection? You can use all of these working examples to learn from and writie simialr queries. Another great feature that Mark will show is it will analyze your data which has beeen aligned to a CIM and tell you which ones you can enable straight away! And what is missing if not. What is the public description of the app? Detect insiders and advanced attackers in your environment with the free Splunk Security Essentials app. This app uses only Splunk Enterprise to show 40+ working examples of the most common user and entity behavior analysis (UEBA) based where possible on Splunk's Common Information Model (CIM). Each use case also includes example demo data so you can see results immediately. The use cases leverage analytics to give analysts the ability to detect unusual activities like users who print more pages than usual (spike detection) or logon to new servers (first seen behavior), the ability to see when adversaries change file names to evade detection, and many more. Each use case includes the expected alert volume, an explanation of how the search works, description of the security impact, and you can save searches directly from the app to leverage any alert actions you have installed such as creating a Notable Event or Risk Indicator in Splunk ES, an External Alarm in Splunk UBA, or just sending email for review.   What is the mission of the app? Provide working examples of the most common use cases in the UEBA space, that can be built out on Splunk Enterprise for free. These proof points / examples are akin to much of what other, lesser vendors are claiming as UBA, which are actually just basic analytics that can be done easily with Splunk Enterprise and do not require the advanced machine learning of a full featured User Behavioral Analytics solution like Splunk UBA. The examples in the app can be used as is, and are also fully documented so they can be customized for more specific end-user scenarios.   What use-cases does this app offer? The use-cases are generic search builders for doing time series analysis and first time analysis, which you can apply to any data you have in Splunk, for any use case you might desire. The app includes many pre-built reports based on Common Information Model data, and includes demo data as examples. Each use case includes the expected alert volume -- for "low" you can expect the alert to fire rarely, probably only every few weeks if that, whereas high volume alerts are likely to fire multiple times per day and should be sent into some upstream processing such as the Splunk ES or Splunk UBA. To make the examples easy to follow, they are organized by Security Domain. Select the Security Domain you're interested in (or just select All Examples) below.
  • #18: No over to Mark who will give you an overview of the app, buthas probably hidden all his own suspicious activity already.
  • #19: Thanks Mark. So lets quickly recap what Sec Essnetialas provides. Its free! IT utiises some of the most common security data tyoes, and provides ove 50 working examples of UEBA like detection using core splunk finding human driven outliers .. But what if you don’t know what your looking for? What about the unknown anmolies? And how do you verify if these anomalies are threats? And how do you visualise these over a kill chain?????
  • #20: These questions tie nicely back into our 2nd goal.
  • #21: SO this is where our Slunk UBA platform comes to the fore.
  • #22: Splunk UBA leverages unsupervised machine learning algorithms to detect anomalous behavior and unknown attack or insider threats
  • #23: Lets say it analyses 10 billion raw events It may find 10 million anomalies through its unsupervised machine learning anomalies. UBA then takes those anomalies and determines how those anomalies are related into sequences of patterns to create threats. Thread modeling It uses graph analysis to then map these threat sequences of events onto the kill chain.
  • #24: So this slide is similar to security essentials which generates also generates anomaly classifications but you can see these anomalies are less specific, Unusual behavior here is undefined but they are still ver interesting. The Second layer of thread modeling ML then turns these into threats. Lets say mark and filip both start generating some anomalies related to simlar entities,servers or data being touched. UBA will link these together , maybe the account is compromised? But there is no obvious intrusion phase? This is starting to look like an inseider threat.
  • #26: To combat or solve this complex space of these sort of attacks there are 5 core pillars, which are the secret sauce to our Splunk UBA solution. It is a A solution that is real-time, and leverages a big data architecture to achieve this, ingetsing data from splunk core platform. multi entitity behavour modelling and baselining. Algorthms using an unsupervised machine learning approach That then creates anomaly detection and the second layer tuns into Threats,, In addition, a multi-layered ML models stitches these anomalies into different threat patterns. -------
  • #28: Detects these unknown threats which tradition sec products cant find. - BETTER DETECTION Reduce anayst time but stitiching these anmolies together for you into single threats _SOC PRODUCTIVITY visualize over kill chain – faster insight and interpretation
  • #30: We havent spoken much about this yet, but hopefully you were all in the last session….
  • #32: It sits on top of Splunk and provides 4 types of functionality Monitor and reports – predefined dashboard views and reports Detect and Alert – out of the box correlation rules and threshold alerts, providing a framework to add more. A platform to analyze and investigate the alerts, adding an abundance of enrichment data and analysis tools. Response platform for you to easily take the right actions quick or even automatically, with Adaptive response letting you integrate with many other security tools you may have.
  • #33: Sec essentials – free app using statists to find targeted anomalies. UBA to find unknown anomalies ES where it is all put together. As you’ve seen Sec essential can send alarms into UBA to increase criticality of threats. IT can also send directly to ES if you don’t have UBA yet. UBA also can send its threats into ES, but provide a nice easy mechanism to switch back between the products as part of your investigation. And remember its not just Sec essentials , any other customer alert you write can be fed into UBA and or ES for investigation
  • #34: 1 - Heimdal Security – 10 Surprising Cyber Security Facts That May Affect Your Online Safety – Andra Zaharia – 2016
  • #36: We can find them and stop them!
  • #37: You can detect and respond
  • #38: Leader in innovation
  • #40: Doesn’t matter if you’re just getting started with Splunk or are a veteran user, everyone learns something and gets reenergized at .conf. 4 inspired Keynotes 165+ Breakout sessions addressing all areas and levels of Operational Intelligence – IT, Business Analytics, Mobile, Cloud, IoT, Security…and MORE! 30+ hours of invaluable networking time with industry thought leaders, technologists, and other Splunk Ninjas and Champions waiting to share their business wins with you! Join the 50%+ of Fortune 100 companies who attended so many like minded guys will be there. REGISTRATION IS OPEN now , sessions will be posted by end of June
  • #42: Don’t forget to complete today’s survey at ponypoll.com/slsf for your chance to win a .conf2017 pass. A winner will be identified tomorrow through a random drawing from completed surveys and will be notified via email.