This document outlines an agenda for a presentation on threat hunting with Splunk. The presentation will cover threat hunting basics, data sources for threat hunting including Sysmon endpoint data, applying the cyber kill chain framework, and a hands-on demo of investigating an attack scenario across various Splunk data sources like endpoint, network, email, and threat intelligence. Credentials are provided for accessing the demo environment. An overview of Sysmon endpoint event data and using it to map processes and network connections is also given.