Accenture Communications Industry Narrative Trend Shifts Signalsaccenture
The document discusses major shifts happening in the communications industry and identifies five signals of these shifts. The three major industry shifts are: 1) Customer re-imagination as life, work, learning and entertainment become more connected and centered around the home. 2) Business model re-invention as new growth strategies and partnerships are needed due to stagnating returns. 3) Technology re-volution as 5G, cloud, edge computing and other technologies open new opportunities for communications providers to transform into technology companies. The five signals highlighted are increased home connectivity demands, connectivity as an essential right, the need for new business models, expanded partnership strategies, and communications providers transforming into technology companies.
EY provides advisory services to help clients grow, protect, and optimize their businesses in response to changing external forces through strategies that drive transformational change, processes that optimize business outcomes, and technologies that enable performance. EY works globally with clients in over 150 countries with over 31,000 professionals to build a better working world.
A.T. Kearney reached out to more than 2,000 executives, business leaders, and heads of strategy functions to discuss their thoughts on the state of strategy today. Our findings indicate that while most leaders continue to believe in strategy, the return on their strategy initiatives has largely eroded over the past decade. In fact, when asked what it takes to secure a prosperous future, more than 80 percent of executives consider agility as important or more important than strategy when it comes to securing a prosperous future. Fortunately, the findings also point to promising ways to reclaim strategy—including using future-focused tools and techniques and engaging the organization in strategy formulation.
This document provides an overview of best practices in metadata management. It discusses what metadata is, why it is important, and how it adds context and definition to data. Metadata management is part of an overall data strategy. The document outlines different types of metadata and how it is used by various roles like developers, business people, auditors, and data architects. It discusses challenges like inconsistent metadata that can lead to issues. It also provides examples of metadata sources, architectural options, and how metadata enables capabilities like data lineage, impact analysis, and semantic relationships.
EY Price Point: global oil and gas market outlook (Q4, October 2020)EY
Oil and gas prices have recovered steadily from their lows and are relatively stable, but that stability is supported by the combination of purposeful withholding of production by oil-producing countries and economic stress on upstream independents. Oil prices closed the quarter roughly where they started it, while refining spreads were down slightly. LNG spreads were substantially higher at the end of Q3 than they were at the beginning of the quarter but are still roughly half of what is generally thought of as sustainable.
Going forward, the market will be looking closely at how the economy and demand respond to new developments with respect to a potential COVID-19 vaccine and the US election.
An SCCT provides more than just visibility - it orchestrates intelligent response and execution throughout the supply chain. GE Appliances implemented a control tower that reduced order backlogs through real-time tracking and machine learning. True SCCTs anticipate market changes, deeply understand customers, and engage them with personalized experiences. They are built on flexible cloud architectures and implement capabilities through a hybrid approach of business use cases over time to generate quick value while strengthening organization-wide capabilities.
Slides: Taking an Active Approach to Data GovernanceDATAVERSITY
A Look at How Riot Games Implemented Non-Invasive Data Governance
Riot Games created and runs “League of Legends,” the world’s most-played PC game and most viewed eSport — and is now transforming to become a multi-title publisher. To keep pace with this transformation and support a growing player base of millions, Riot Games is taking a page from Bob Seiner’s book, “Non-Invasive Data Governance: The Path of Least Resistance and Greatest Success” and leveraging the Alation Data Catalog to help guide accurate, well-governed analysis.
Bob Seiner will join Riot Games’ Chris Kudelka, Technical Product Manager, and Michael Leslie, Senior Data Governance Architect, and Alation’s John Wills, VP of Professional Service, for an inside look at Data Governance at one of the world’s leading gaming companies.
Join this webinar to learn:
• How Riot Games is implementing Non-Invasive Data Governance
• How this new approach to Data Governance helps to drive the business
• How the Alation Data Catalog helps Riot Games create the foundation for guiding accurate, well-governed data use
McKinsey | When Things Get Complex: Complex Systems, Challenges and Where to ...Intland Software GmbH
This talk was presented by Georg Doll (McKinsey Digital Munich) at Intland Connect: Annual User Conference 2020 on 22 Oct 2020. To learn more, visit: https://intland.com/intland-connect-annual-user-conference-2020/
The document discusses IT governance and provides an overview of key frameworks for IT governance, including ISO 38500 and COBIT. It begins by defining governance and describing how governance applies to IT. It then discusses why IT governance is important for organizations, noting benefits like ensuring strategic alignment between IT and business goals. The document also provides a detailed overview of the ISO 38500 standard for IT governance, describing its scope, framework and principles. It explains the standard's six principles of IT governance and provides examples. Overall, the document serves to introduce the topic of IT governance and some of the most relevant frameworks.
Articles published as sponsored content in the Risk & Compliance Journal from The Wall Street Journal from August 2017 to August 2018. https://deloi.tt/2CMG6lI
COBIT 5 as an IT Management Best Practices Framework - by Goh Boon NamNUS-ISS
COBIT is a framework of best practices for IT management and governance. It consists of five domains covering strategic alignment of IT (Align, Plan, Organize), resource management (Build, Acquire, Implement), IT service delivery and support (Deliver, Service, Support), and performance monitoring and evaluation (Monitor, Evaluate, Assess). The framework provides guidance on what processes need to be implemented and metrics to measure effectiveness.
This presentation provides an overview of Enterprise Architecture Frameworks. It is presented by the Semantech Inc. Enterprise Architecture Center of Excellence. The purpose of the briefing is to provide a better understanding of how Frameworks are used in the practice of EA.
84.6% of responding C-suite and other executive feel confident in their organizations’ abilities to manage cash and liquidity, according to a Deloitte poll conducted on Oct. 15, 2020. But as uncertainty persists, it’s important for organizations to continue to improve and strengthen their cash and liquidity management abilities so as not to provide a false sense of security.
The document discusses Oracle's enterprise architecture approach and services. It provides an overview of Oracle's enterprise architecture framework and reference architectures. It also highlights two customer case studies where Oracle helped customers transform their architecture and move to shared services and cloud computing models.
Global power and utilities deal value totaled $26.8 billion in Q2 2019, a 44% increase from Q1 2019. The Americas had the largest deal value at $13.1 billion. Financial investors dominated deal activity, seeking stability from integrated utility assets. Renewable energy continued to attract investment, driving interest in battery storage technologies. Utilities also invested in new technologies like blockchain, smart grids, and electric vehicles. Overall, utilities gained value in Q2 but slightly underperformed the market.
What is the Value of Mature Enterprise Architecture TOGAFxavblai
This document summarizes the key points made by Judith Jones, CEO of Architecting the Enterprise, in her presentation at the Telelogic Conference on November 4th 2008 about the value of mature enterprise architecture. She discusses how enterprise architecture exists within every organization and affects its efficiency and effectiveness. It is not optional. She outlines TOGAF as the industry standard architecture framework and how it provides best practices and professionalism. Mature enterprise architecture helps organizations get work done quicker, reduce risks, and lower running costs, demonstrating its business value.
Digital Transformation Strategy & Framework | By ex-McKinseyAurelien Domont, MBA
Go to www.slidebooks.com to Download and Reuse Now a Digital Transformation Strategy & Framework in Powerpoint | Created By ex-McKinsey & Deloitte Strategy Consultants.
Journey To Cloud – Arrive First with ServiceNow and AccentureAccenture Operations
Accenture helps companies drive greater innovation, flexibility and experiences into the enterprise with ServiceNow, managing the simplest to most complex cloud transformations with our end-to-end services, broad ecosystem, industry skills and size and scale.
A well-designed IT Service Delivery Model is critical to achieving success in IT management and operations. Many IT organizations focus on optimizing their technology assets -- the infrastructure and applications. However, in our experience, business value is achieved most effectively when technology assets and the IT service delivery model are integrated and work together seamlessly.
Unleashing Competitiveness on the Cloud Continuum | Accentureaccenture
Accenture reports how the cloud continuum creates a seamless technology & capability foundation that meets business needs now and in the future. Read more.
Overview presentation of Deloitte LLP's U.S. Federal government practice.
A top-20 Federal services provider, Deloitte serves clients with wide-ranging missions in the United States and around the world.
The document summarizes best practices in strategic planning presented by The Boston Consulting Group to the Indonesian Ministry of Transportation. It discusses how companies can create a more effective annual strategic planning process by exploring strategy across time horizons, constantly stimulating strategic dialogue, engaging the broader organization, and investing in execution and monitoring. Specific practices highlighted include exploring long-term visions and scenarios, setting business unit strategies, using a "W-approach" for strategic discussions, scanning the environment, involving stakeholders, and operationalizing strategies.
The document discusses how Accenture is helping drive digital transformation in the energy industry through the Open Group OSDU data platform. It summarizes that:
1) By standardizing a common data platform across the industry through OSDU, it will reduce costs, remove data silos, and enable innovation.
2) Accenture provides end-to-end services to help companies maximize their investment in OSDU, from data strategy to application development to sustaining performance.
3) Accenture tailors its capabilities to help companies discover challenges, envision solutions, co-create fit-for-purpose approaches, scale implementations, and sustain value from digital transformation.
How to Build & Sustain a Data Governance Operating Model DATUM LLC
Learn how to execute a data governance strategy through creation of a successful business case and operating model.
Originally presented to an audience of 400+ at the Master Data Management & Data Governance Summit.
Visit www.datumstrategy.com for more!
Governance Risk Management and Compliance (GRC)Seta Wicaksana
Government, Risk Management, and Compliance - GRC is important because it offers a holistic view of risk that streamlines decision-making regarding issues that aren’t always unified.
From regulatory changes to stakeholder demands, boards are under pressure to manage interrelated priorities that can be difficult to align.
GRC is one of the best tools boards have to integrate GRC functions and ensure that all operations align with strategic objectives while also adhering to legal and regulatory requirements.
Yet, in a 2023 survey of those who either manage or oversee their organization’s risk and compliance strategy, only 53% said their programs were mature — making effective adoption of GRC tools and strategies an imperative.
The document discusses best practices for scaling digital innovation from pilots to drive growth. It finds that while over 60% of companies scale pilots, less than 20% do so successfully. The top 15% of companies ("Champions") manage scaling differently by following four best practices: 1) defining value to guide efforts; 2) blending organizational change with initiatives; 3) building in-house innovation factories; and 4) mapping enablers to functions. Champions achieve over 4 times the returns of other companies. The document provides a roadmap for organizations to mature towards successfully scaling innovation by leveraging five organizational levers.
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Technology
The document discusses how cybercriminals are outpacing digital businesses due to a rise in security threats, data breaches, and malware. It emphasizes that organizations need to not only prevent security breaches but also detect, intercept, and remediate threats to truly defend and empower themselves. Accenture provides security services to help clients build resilience, outpace attackers, and focus on innovation and business growth without interruptions from increasingly sophisticated cyber threats.
This document discusses managed IT services provided by GSS America. It outlines various challenges faced by organizations including budget constraints, lack of skills, and regulatory compliance issues. GSS provides a range of managed services including infrastructure management, application management, and service delivery frameworks. Case studies demonstrate how GSS has helped clients through dedicated support teams, standard operating procedures, and optimized costs while ensuring quality of service and end user satisfaction.
Accelerating SDLC for Large Public Sector Enterprise ApplicationsSplunk
This document discusses how big data analytics tools like Splunk can be used to accelerate the software development lifecycle for large public sector applications. It provides examples of how Splunk was used to improve productivity by enabling immediate log access across many servers and files. Splunk also created real-time performance dashboards to help identify root causes of issues. Additional analytics revealed insights like peak usage times and patterns, user behaviors on forms, and browser/device details. The summary concludes that these tools can improve IT and business while providing lessons on proper Splunk setup and logging the right application data.
The document discusses IT governance and provides an overview of key frameworks for IT governance, including ISO 38500 and COBIT. It begins by defining governance and describing how governance applies to IT. It then discusses why IT governance is important for organizations, noting benefits like ensuring strategic alignment between IT and business goals. The document also provides a detailed overview of the ISO 38500 standard for IT governance, describing its scope, framework and principles. It explains the standard's six principles of IT governance and provides examples. Overall, the document serves to introduce the topic of IT governance and some of the most relevant frameworks.
Articles published as sponsored content in the Risk & Compliance Journal from The Wall Street Journal from August 2017 to August 2018. https://deloi.tt/2CMG6lI
COBIT 5 as an IT Management Best Practices Framework - by Goh Boon NamNUS-ISS
COBIT is a framework of best practices for IT management and governance. It consists of five domains covering strategic alignment of IT (Align, Plan, Organize), resource management (Build, Acquire, Implement), IT service delivery and support (Deliver, Service, Support), and performance monitoring and evaluation (Monitor, Evaluate, Assess). The framework provides guidance on what processes need to be implemented and metrics to measure effectiveness.
This presentation provides an overview of Enterprise Architecture Frameworks. It is presented by the Semantech Inc. Enterprise Architecture Center of Excellence. The purpose of the briefing is to provide a better understanding of how Frameworks are used in the practice of EA.
84.6% of responding C-suite and other executive feel confident in their organizations’ abilities to manage cash and liquidity, according to a Deloitte poll conducted on Oct. 15, 2020. But as uncertainty persists, it’s important for organizations to continue to improve and strengthen their cash and liquidity management abilities so as not to provide a false sense of security.
The document discusses Oracle's enterprise architecture approach and services. It provides an overview of Oracle's enterprise architecture framework and reference architectures. It also highlights two customer case studies where Oracle helped customers transform their architecture and move to shared services and cloud computing models.
Global power and utilities deal value totaled $26.8 billion in Q2 2019, a 44% increase from Q1 2019. The Americas had the largest deal value at $13.1 billion. Financial investors dominated deal activity, seeking stability from integrated utility assets. Renewable energy continued to attract investment, driving interest in battery storage technologies. Utilities also invested in new technologies like blockchain, smart grids, and electric vehicles. Overall, utilities gained value in Q2 but slightly underperformed the market.
What is the Value of Mature Enterprise Architecture TOGAFxavblai
This document summarizes the key points made by Judith Jones, CEO of Architecting the Enterprise, in her presentation at the Telelogic Conference on November 4th 2008 about the value of mature enterprise architecture. She discusses how enterprise architecture exists within every organization and affects its efficiency and effectiveness. It is not optional. She outlines TOGAF as the industry standard architecture framework and how it provides best practices and professionalism. Mature enterprise architecture helps organizations get work done quicker, reduce risks, and lower running costs, demonstrating its business value.
Digital Transformation Strategy & Framework | By ex-McKinseyAurelien Domont, MBA
Go to www.slidebooks.com to Download and Reuse Now a Digital Transformation Strategy & Framework in Powerpoint | Created By ex-McKinsey & Deloitte Strategy Consultants.
Journey To Cloud – Arrive First with ServiceNow and AccentureAccenture Operations
Accenture helps companies drive greater innovation, flexibility and experiences into the enterprise with ServiceNow, managing the simplest to most complex cloud transformations with our end-to-end services, broad ecosystem, industry skills and size and scale.
A well-designed IT Service Delivery Model is critical to achieving success in IT management and operations. Many IT organizations focus on optimizing their technology assets -- the infrastructure and applications. However, in our experience, business value is achieved most effectively when technology assets and the IT service delivery model are integrated and work together seamlessly.
Unleashing Competitiveness on the Cloud Continuum | Accentureaccenture
Accenture reports how the cloud continuum creates a seamless technology & capability foundation that meets business needs now and in the future. Read more.
Overview presentation of Deloitte LLP's U.S. Federal government practice.
A top-20 Federal services provider, Deloitte serves clients with wide-ranging missions in the United States and around the world.
The document summarizes best practices in strategic planning presented by The Boston Consulting Group to the Indonesian Ministry of Transportation. It discusses how companies can create a more effective annual strategic planning process by exploring strategy across time horizons, constantly stimulating strategic dialogue, engaging the broader organization, and investing in execution and monitoring. Specific practices highlighted include exploring long-term visions and scenarios, setting business unit strategies, using a "W-approach" for strategic discussions, scanning the environment, involving stakeholders, and operationalizing strategies.
The document discusses how Accenture is helping drive digital transformation in the energy industry through the Open Group OSDU data platform. It summarizes that:
1) By standardizing a common data platform across the industry through OSDU, it will reduce costs, remove data silos, and enable innovation.
2) Accenture provides end-to-end services to help companies maximize their investment in OSDU, from data strategy to application development to sustaining performance.
3) Accenture tailors its capabilities to help companies discover challenges, envision solutions, co-create fit-for-purpose approaches, scale implementations, and sustain value from digital transformation.
How to Build & Sustain a Data Governance Operating Model DATUM LLC
Learn how to execute a data governance strategy through creation of a successful business case and operating model.
Originally presented to an audience of 400+ at the Master Data Management & Data Governance Summit.
Visit www.datumstrategy.com for more!
Governance Risk Management and Compliance (GRC)Seta Wicaksana
Government, Risk Management, and Compliance - GRC is important because it offers a holistic view of risk that streamlines decision-making regarding issues that aren’t always unified.
From regulatory changes to stakeholder demands, boards are under pressure to manage interrelated priorities that can be difficult to align.
GRC is one of the best tools boards have to integrate GRC functions and ensure that all operations align with strategic objectives while also adhering to legal and regulatory requirements.
Yet, in a 2023 survey of those who either manage or oversee their organization’s risk and compliance strategy, only 53% said their programs were mature — making effective adoption of GRC tools and strategies an imperative.
The document discusses best practices for scaling digital innovation from pilots to drive growth. It finds that while over 60% of companies scale pilots, less than 20% do so successfully. The top 15% of companies ("Champions") manage scaling differently by following four best practices: 1) defining value to guide efforts; 2) blending organizational change with initiatives; 3) building in-house innovation factories; and 4) mapping enablers to functions. Champions achieve over 4 times the returns of other companies. The document provides a roadmap for organizations to mature towards successfully scaling innovation by leveraging five organizational levers.
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Technology
The document discusses how cybercriminals are outpacing digital businesses due to a rise in security threats, data breaches, and malware. It emphasizes that organizations need to not only prevent security breaches but also detect, intercept, and remediate threats to truly defend and empower themselves. Accenture provides security services to help clients build resilience, outpace attackers, and focus on innovation and business growth without interruptions from increasingly sophisticated cyber threats.
This document discusses managed IT services provided by GSS America. It outlines various challenges faced by organizations including budget constraints, lack of skills, and regulatory compliance issues. GSS provides a range of managed services including infrastructure management, application management, and service delivery frameworks. Case studies demonstrate how GSS has helped clients through dedicated support teams, standard operating procedures, and optimized costs while ensuring quality of service and end user satisfaction.
Accelerating SDLC for Large Public Sector Enterprise ApplicationsSplunk
This document discusses how big data analytics tools like Splunk can be used to accelerate the software development lifecycle for large public sector applications. It provides examples of how Splunk was used to improve productivity by enabling immediate log access across many servers and files. Splunk also created real-time performance dashboards to help identify root causes of issues. Additional analytics revealed insights like peak usage times and patterns, user behaviors on forms, and browser/device details. The summary concludes that these tools can improve IT and business while providing lessons on proper Splunk setup and logging the right application data.
After a major slowdown that stunted the growth of the IT sector briefly, the industry has revived and given a boost to its order books with its numerous efforts.
Hosting - The Future of Business Grade CommunicationsPartner Talk
The document is an agenda for an event titled "Hosting: The Future of Business Grade Communications" being held on May 1st, 2012 at the Grand Connaught Rooms in London. The agenda outlines the schedule for the day which includes an opening, introductions, presentations on the growing hosted marketplace and the move to hosted communications, breakout sessions, and a champagne reception. Presenters will discuss topics like the cloud computing market, hosted solutions, virtualization, and how the cloud is impacting partners. The document provides an overview of the event and presentations that will explore trends in cloud computing and hosted communications.
This document discusses consuming unified communications through delivery models like hosted or on-premise deployments. It summarizes InterCall and POSTcti's offerings around unified communications consulting, deployment, integration, and managed services. Key solutions discussed include hosted or on-premise Lync with unified desktop capabilities, audio/video/web conferencing, contact centers, mobility options, and partnerships with vendors like Microsoft, Cisco, Polycom, and Plantronics.
Dynamic Data Center for Hosters, by Stefan SimonAlexey Kovyazin
The document discusses Dynamic Data Center (DDC), an industry term for a virtualized and automated infrastructure that provides real-time provisioning, high availability, unlimited capacity, and self-healing capabilities. It outlines the goals and technologies covered by DDC for hosting providers, including Hyper-V, System Center components, and guidance for bare metal and virtual server provisioning. The presentation also provides overviews of key Dynamic Data Center technologies like Hyper-V, clustered shared volumes, live migration, and how System Center products like Virtual Machine Manager, Operations Manager, and Data Protection Manager integrate with and support a DDC.
No “one size fits all” managed services solution will ever be ideal for every business. When evaluating prospective providers, consider important services such as monitoring, reporting, backup, remote management and security. Also consider key provider qualifications including location, third-party certifications, customer references, in-house staffing resources and contract items. After outsourcing, you should see immediate results in cost controls and service delivery.
Measuring the return from pharmaceutical innovation 2016Deloitte UK
The seventh annual pharmaceutical innovation study by the Deloitte UK Centre for Health Solutions looks at the challenges the industry faces in generating returns from its R&D investments while highlighting the key strategies to help increase pipeline value while reduce R&D costs to generate sustainable R&D returns.
Integrated Direct Procurement Made Easier with SAP and SAP Ariba SolutionsSAP Ariba
This document discusses how SAP and SAP Ariba solutions can help make direct procurement easier through integration and innovation. It notes that cost reduction remains a top priority for companies amid market uncertainty. SAP extends its digital capabilities with cloud procurement solutions to address all types of spend, including direct materials. SAP Ariba is being integrated with SAP S/4HANA SCM products to increase process efficiency and supplier visibility across the supply chain. Benefits of the SAP Ariba solutions for direct material procurement include sourcing and supply chain improvements, productivity gains, working capital optimization, and spend compliance.
This document provides an overview and sales presentation of Splunk software capabilities. Some key points:
- Splunk is a software platform that allows users to search, monitor and analyze machine-generated data for security and operational intelligence.
- It can index and search data from many different sources like servers, applications, networks and more.
- Splunk offers scalability to handle indexing and searching large volumes of data up to terabytes per day across multiple data centers.
- The software provides features like search and investigation, proactive monitoring, operational visibility and real-time business insights.
MAD HATS currently faces obstacles to growth including market saturation, lack of marketing strategy, and disconnected IT systems. The document recommends (1) introducing seasonal hats tied to causes, (2) utilizing IT systems like ERP and SOA for operations and analysis, and (3) restructuring leadership and adding positions like CIO. These strategic, technological, and human capital initiatives would work together to help MAD HATS overcome barriers through frequent product releases, expanded demographics, and optimized operations. The recommendations are estimated to cost $750,000 initially but would make the company profitable over $15 million within 5 years according to risk analysis.
This document analyzes the author's past and present romantic relationships using a BCG matrix format. It summarizes that the author's current relationship ranks highly compared to other relationships but that awareness of the relationship is low. The physical characteristics between the author and his partner are described as strong, though a disconnect was found between what the partner needs from the relationship and what the author provides. The summary concludes that the current relationship appears to be weakening with long-term prospects diminishing, and that addressing roadblocks is important to maintain the relationship.
Splunk Discovery Day Düsseldorf 2016 - Splunk für SecuritySplunk
Splunk Enterprise Security is an advanced security information and event management (SIEM) and security intelligence platform that allows organizations to monitor, detect, investigate, and respond to cyberattacks and threats. It provides risk-based analytics, security intelligence, continuous monitoring of security domains, and incident response capabilities through features like alerts and dashboards, pre-built searches, threat intelligence integration, and an investigation timeline. The platform helps connect data from various sources to gain security insights and identify unknown threats.
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
A quick summary of the current state of big data technology and data science approaches used in cyber / network defender security analytics including summary use cases, a walk through of a reference architecture and breakdown of the required skills. Focus is on the knowledge needed to run a proof of concept and establish a programme for early benefits. Will then also include a view on the future of extending the platforms and capabilities of security analytics to cover performance metrics and data-driven security management approaches.
Splunk EMEA Webinar: Scoping infections and disrupting breachesSplunk
This document discusses best practices for scoping infections and disrupting breaches. It outlines the necessary data sources like network endpoint, access/identity, and threat intelligence data. It describes capabilities for monitoring, alerting, investigating incidents, and detecting threats. The document demonstrates investigating a breach example using the attack kill chain. It recommends establishing a security intelligence platform to connect and analyze security-related data from multiple sources. Lastly, it promotes the upcoming Splunk conference and training opportunities.
The document discusses security session presented by Philipp Drieger. It begins with a safe harbor statement noting any forward-looking statements are based on current expectations and could differ from actual results. The agenda includes discussing Splunk for security, enterprise security, and Splunk user behavior analytics. It provides examples of how Splunk can be used to detect threats like fraud and advanced persistent threats by analyzing machine data from various sources. It also discusses how threat intelligence can be incorporated using STIX/TAXII standards and open IOCs. Customer examples show how Nasdaq and Cisco have replaced their SIEMs with Splunk to gain better scalability and flexibility.
The document is an agenda for a security session presentation by Splunk. It includes an introduction to Splunk for security use cases, a demo of the Zeus security product, and a discussion of enterprise security and user behavior analytics solutions from Splunk. Key points include how Splunk can provide a unified platform for security data from multiple sources, detect advanced threats that are difficult to find, and help connect related security events to better understand security incidents.
The document discusses how Splunk can provide analytics-driven security for higher education through ingesting and analyzing machine data. It outlines how advanced threats have evolved to be more coordinated and evasive. A new approach is needed that fuses technology, human intuition, and processes like collaboration to detect attackers through contextual behavioral analysis of all available data. Examples are provided of security questions that can be answered through Splunk analytics.
Splunk Discovery Day Dubai 2017 - Security KeynoteSplunk
This document discusses Splunk's security vision, strategy, and platform. It outlines Splunk's positioning as a leader in security information and event management. It describes Splunk's security portfolio and how the platform can be used to prevent, detect, respond to and predict security threats. It also provides examples of how Splunk has helped customers in various industries improve their security operations and gain insights from security and other machine data.
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...Splunk
This document summarizes how Splunk Enterprise Security can help organizations strengthen their security posture and operationalize security processes. It discusses how Splunk ES allows organizations to centralize analysis of endpoint, network, identity, and threat data for improved visibility. It also emphasizes developing an investigative mindset when handling alerts to efficiently determine the root cause. Finally, it explains how Splunk ES can operationalize security processes by providing a single source of truth and integrating security technologies to automate responses.
Operationalizing Big Data Security Analytics - IANS Forum Toronto KeynoteInterset
Presented by Stephan Jou, Interset CTO, at IANS Forum Toronto 2018, this presentation explores how companies can operationalize security analytics with Interset's threat detection platform, which distills billions of events into a handful of prioritized threat leads through unsupervised machine learning and an open source, big data architecture.
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk
This session will review Splunk’s two premium solutions - Splunk Enterprise Security (ES) is Splunk's award-winning security intelligence solution that brings immediate value for continuous monitoring across SOC and
incident response environments. Splunk UBA is a new technology that applies unsupervised machine learning and data science to solving one of the biggest problems in information security today: insider threat. You’ll learn how Splunk UBA works in tandem with ES, or third-party data sources, to bring significant automated analytical power to your SOC and Incident Response teams.
Applied cognitive security complementing the security analyst Priyanka Aash
Security incidents are increasing dramatically and becoming more sophisticated, making it almost impossible for security analysts to keep up. A cognitive solution that can learn about security from structured and unstructured information sources is essential. It can be applied to empower security analysts with insights to qualify incidents and investigate risks quickly and accurately.
(Source : RSA Conference 2017)
SplunkLive Auckland 2015 - Splunk for SecuritySplunk
This document discusses how Splunk User Behavior Analytics (UBA) uses machine learning and behavioral analytics to detect threats. It provides an overview of how UBA analyzes logs from various systems to detect anomalies and threats across the kill chain. The document explains that UBA reduces events for SOC analysts to investigate by 99.99% and provides key workflows for threat detection and security analytics/hunting of threats. It provides an example of how UBA could detect a potential insider threat involving a user elevating privileges and potentially exfiltrating sensitive documents.
This document discusses how Splunk User Behavior Analytics (UBA) uses machine learning and behavioral analytics to detect threats. It provides an overview of how UBA analyzes logs from various systems to detect anomalies and threats across the kill chain. The document explains that UBA reduces events for SOC analysts to investigate by 99.99% and provides key workflows for threat detection and security analytics/hunting of threats. It provides an example of how UBA could detect a potential insider threat involving a user elevating privileges and potentially exfiltrating sensitive documents.
SplunkLive Wellington 2015 - Splunk for SecuritySplunk
This document discusses how Splunk User Behavior Analytics (UBA) uses machine learning and behavioral analytics to detect threats. It provides an overview of how UBA analyzes logs from various systems to detect anomalies and threats across the kill chain. The document explains that UBA reduces events for SOC analysts to investigate by 99.99% and provides key workflows for threat detection and security analytics/hunting of threats. It provides an example of how UBA could detect a potential insider threat involving a user elevating privileges and potentially exfiltrating sensitive documents.
This document contains a presentation on cloud security. It discusses how security approaches need to change to adapt to virtualized and cloud environments. Traditional security methods of provisioning separate security for each server need to change to more automated and workload-aware approaches. The presentation discusses how security can be provisioned automatically during resource provisioning. It also discusses how security capabilities can be managed efficiently at scale through continuous monitoring and vulnerability mitigation techniques. The presentation argues that securing data centers and extending their security to public clouds requires optimizing security to reduce the impact on resources. It outlines shared responsibilities between cloud providers and customers to ensure security. The presentation emphasizes that incident response still requires capabilities like digital forensics to fully investigate security compromises in virtual and
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentInfocyte
This webinar and presentation outlines the Infocyte HUNT threat detection and incident response platform, and how it enables state and local government organizations:
- Reduce risk across local, off-network, and cloud IT assets
- Expose and eliminate hidden cyber threats and vulnerabilities
- Streamline your overall security operations
- Achieve and maintain compliance
Using Infocyte, TIG can provide their customers with cost-effective, easy-to-manage, and on-demand cybersecurity consulting services (e.g. compromise assessments, incident response) and managed security services (e.g. managed detection and response).
Visit https://www.infocyte.com/ to learn more and request a demo, or request a cybersecurity risk assessment (Compromise Assessment) using the link below:
https://www.infocyte.com/free-compromise-assessment/
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...Cloudera, Inc.
Learn how to:
* Detect threats automatically and accurately
* Reduce threat response times from 7 days to 4 hour
* Ingest and process 100+TB per day for automated machine learning and behavior-based detection
IT-Lagebild: Observability for Resilience (SVA)Splunk
Splunk Public Sector Summit Germany April 2025
Präsentation: IT-Lagebild:
Observability for
Resilience
Sprecher:
Giscard Venn -
Fachvertrieb Big Data & AI
Sebastian Kramp - Team Lead Technical Business Analytics
Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)Splunk
Splunk Public Sector Summit Germany April 2025
Präsentation: Nach dem SOC-Aufbau ist vor der Automatisierung
Sprecher: Sven Beisel, Fachreferent SOC, Oberfinanzdirektion Baden-Württemberg
Security - Mit Sicherheit zum Erfolg (Telekom)Splunk
Splunk Public Sector Summit 2025
Präsentation von der Telekom: "Security - Mit Sicherheit zum Erfolg"
Sprecher:
Thomas Beinke - Senior Sales Expert
Lars Fürle - Senior Sales Expert
One Cisco - Splunk Public Sector Summit Germany April 2025Splunk
Splunk Public Sector Summit Germany April 2025
Präsentation: Cisco & Splunk Stronger Together ...gemeinsam noch stärker
Sprecher: Philipp Behre - Field CTO & Strategic Advisor, Technology & Innovation, Splunk
.conf Go 2023 - Raiffeisen Bank InternationalSplunk
This document discusses standardizing security operations procedures (SOPs) to increase efficiency and automation. It recommends storing SOPs in a code repository for versioning and referencing them in workbooks which are lists of standard tasks to follow for investigations. The goal is to have investigation playbooks in the security orchestration, automation and response (SOAR) tool perform the predefined investigation steps from the workbooks to automate incident response. This helps analysts automate faster without wasting time by having standard, vendor-agnostic procedures.
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...Splunk
.conf Go 2023 presentation:
"Das passende Rezept für die digitale (Security) Revolution zur Telematik Infrastruktur 2.0 im Gesundheitswesen?"
Speaker: Stefan Stein -
Teamleiter CERT | gematik GmbH M.Eng. IT-Sicherheit & Forensik,
doctorate student at TH Brandenburg & Universität Dresden
El documento describe la transición de Cellnex de un Centro de Operaciones de Seguridad (SOC) a un Equipo de Respuesta a Incidentes de Seguridad (CSIRT). La transición se debió al crecimiento de Cellnex y la necesidad de automatizar procesos y tareas para mejorar la eficiencia. Cellnex implementó Splunk SIEM y SOAR para automatizar la creación, remediación y cierre de incidentes. Esto permitió al personal concentrarse en tareas estratégicas y mejorar KPIs como tiempos de resolución y correos electrónicos anal
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)Splunk
Este documento resume el recorrido de ABANCA en su camino hacia la ciberseguridad con Splunk, desde la incorporación de perfiles dedicados en 2016 hasta convertirse en un centro de monitorización y respuesta con más de 1TB de ingesta diaria y 350 casos de uso alineados con MITRE ATT&CK. También describe errores cometidos y soluciones implementadas, como la normalización de fuentes y formación de operadores, y los pilares actuales como la automatización, visibilidad y alineación con MITRE ATT&CK. Por último, señala retos
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk
BMW is defining the next level of mobility - digital interactions and technology are the backbone to continued success with its customers. Discover how an IT team is tackling the journey of business transformation at scale whilst maintaining (and showing the importance of) business and IT service availability. Learn how BMW introduced frameworks to connect business and IT, using real-time data to mitigate customer impact, as Michael and Mark share their experience in building operations for a resilient future.
AI and Data Privacy in 2025: Global TrendsInData Labs
In this infographic, we explore how businesses can implement effective governance frameworks to address AI data privacy. Understanding it is crucial for developing effective strategies that ensure compliance, safeguard customer trust, and leverage AI responsibly. Equip yourself with insights that can drive informed decision-making and position your organization for success in the future of data privacy.
This infographic contains:
-AI and data privacy: Key findings
-Statistics on AI data privacy in the today’s world
-Tips on how to overcome data privacy challenges
-Benefits of AI data security investments.
Keep up-to-date on how AI is reshaping privacy standards and what this entails for both individuals and organizations.
Role of Data Annotation Services in AI-Powered ManufacturingAndrew Leo
From predictive maintenance to robotic automation, AI is driving the future of manufacturing. But without high-quality annotated data, even the smartest models fall short.
Discover how data annotation services are powering accuracy, safety, and efficiency in AI-driven manufacturing systems.
Precision in data labeling = Precision on the production floor.
Buckeye Dreamin 2024: Assessing and Resolving Technical DebtLynda Kane
Slide Deck from Buckeye Dreamin' 2024 presentation Assessing and Resolving Technical Debt. Focused on identifying technical debt in Salesforce and working towards resolving it.
What is Model Context Protocol(MCP) - The new technology for communication bw...Vishnu Singh Chundawat
The MCP (Model Context Protocol) is a framework designed to manage context and interaction within complex systems. This SlideShare presentation will provide a detailed overview of the MCP Model, its applications, and how it plays a crucial role in improving communication and decision-making in distributed systems. We will explore the key concepts behind the protocol, including the importance of context, data management, and how this model enhances system adaptability and responsiveness. Ideal for software developers, system architects, and IT professionals, this presentation will offer valuable insights into how the MCP Model can streamline workflows, improve efficiency, and create more intuitive systems for a wide range of use cases.
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxshyamraj55
We’re bringing the TDX energy to our community with 2 power-packed sessions:
🛠️ Workshop: MuleSoft for Agentforce
Explore the new version of our hands-on workshop featuring the latest Topic Center and API Catalog updates.
📄 Talk: Power Up Document Processing
Dive into smart automation with MuleSoft IDP, NLP, and Einstein AI for intelligent document workflows.
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfAbi john
Analyze the growth of meme coins from mere online jokes to potential assets in the digital economy. Explore the community, culture, and utility as they elevate themselves to a new era in cryptocurrency.
Semantic Cultivators : The Critical Future Role to Enable AIartmondano
By 2026, AI agents will consume 10x more enterprise data than humans, but with none of the contextual understanding that prevents catastrophic misinterpretations.
Technology Trends in 2025: AI and Big Data AnalyticsInData Labs
At InData Labs, we have been keeping an ear to the ground, looking out for AI-enabled digital transformation trends coming our way in 2025. Our report will provide a look into the technology landscape of the future, including:
-Artificial Intelligence Market Overview
-Strategies for AI Adoption in 2025
-Anticipated drivers of AI adoption and transformative technologies
-Benefits of AI and Big data for your business
-Tips on how to prepare your business for innovation
-AI and data privacy: Strategies for securing data privacy in AI models, etc.
Download your free copy nowand implement the key findings to improve your business.
Automation Dreamin' 2022: Sharing Some Gratitude with Your UsersLynda Kane
Slide Deck from Automation Dreamin'2022 presentation Sharing Some Gratitude with Your Users on creating a Flow to present a random statement of Gratitude to a User in Salesforce.
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfSoftware Company
Explore the benefits and features of advanced logistics management software for businesses in Riyadh. This guide delves into the latest technologies, from real-time tracking and route optimization to warehouse management and inventory control, helping businesses streamline their logistics operations and reduce costs. Learn how implementing the right software solution can enhance efficiency, improve customer satisfaction, and provide a competitive edge in the growing logistics sector of Riyadh.
Learn the Basics of Agile Development: Your Step-by-Step GuideMarcel David
New to Agile? This step-by-step guide is your perfect starting point. "Learn the Basics of Agile Development" simplifies complex concepts, providing you with a clear understanding of how Agile can improve software development and project management. Discover the benefits of iterative work, team collaboration, and flexible planning.
Spark is a powerhouse for large datasets, but when it comes to smaller data workloads, its overhead can sometimes slow things down. What if you could achieve high performance and efficiency without the need for Spark?
At S&P Global Commodity Insights, having a complete view of global energy and commodities markets enables customers to make data-driven decisions with confidence and create long-term, sustainable value. 🌍
Explore delta-rs + CDC and how these open-source innovations power lightweight, high-performance data applications beyond Spark! 🚀
"Client Partnership — the Path to Exponential Growth for Companies Sized 50-5...Fwdays
Why the "more leads, more sales" approach is not a silver bullet for a company.
Common symptoms of an ineffective Client Partnership (CP).
Key reasons why CP fails.
Step-by-step roadmap for building this function (processes, roles, metrics).
Business outcomes of CP implementation based on examples of companies sized 50-500.
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Impelsys Inc.
Impelsys provided a robust testing solution, leveraging a risk-based and requirement-mapped approach to validate ICU Connect and CritiXpert. A well-defined test suite was developed to assess data communication, clinical data collection, transformation, and visualization across integrated devices.
2. Deloitte at a Large State HHS Agency
Top IT Initiatives
Security Monitoring
– Looking for SIEM replacement
– Technical security
Compliance
– Subject to multiple yearly audits
– CMS, IRS, PCI
Healthcare Program Integrity
– Internal & external monitoring
– Looking for high-risk behaviors and activities – indicators
2
3. IT Challenges
Incident investigation/Incident Response:
– Tough to correlate events across infrastructure
– Time consuming process
– Low visibility into what’s actually going on in environment
Data Correlation:
– Other departments with relevant security data were creating a bottleneck
– Stove piped applications – hard to integrate applications
Program Integrity Issue detection:
– Need to detect high risk behaviors and activities proactively
Remaining compliant:
– Compliance reporting automation
– Splunk & Archer Integration
3
4. Improved Agency Efficiency
With Splunk:
Ingesting security data
– Couple of hours
Reporting & dashboard set-up
– 1-2 days
Incident investigation
– Days
Compliance reports
– Minutes
Program Integrity set-up
– 1-2 months
4
Without Splunk:
Ingesting security data
– 3-5 days
Reporting & dashboard set-up
– 1-2 weeks
Incident investigation
– 2-4 weeks
Compliance reports
– Days
Program Integrity set-up
– 6 months
5. Program Integrity
Agency defined 6 priority use cases to detect program integrity violations
within individuals benefits programs
Ingesting application, endpoint, backend and mainframe data to detect high
risk behaviors and activities
Monitoring external program integrity issues:
Individuals doubling up on monthly benefits
Multiple families receiving benefits under one household
Monitoring internal program integrity issues:
Agency caseworkers approving inappropriate transactions
5
6. Use Case: Program Integrity analysis
6
Insert Screenshot – can be dashboard, report, etc. Can add
as many as needed to explain how you’re using Splunk Dashboard to
identify repeated
issuances of
benefits within a
timeframe
7. Use Case: Database Audit
7
Insert Screenshot – can be dashboard, report, etc. Can add
as many as needed to explain how you’re using Splunk Dashboard to
analyze audit
logs from
multiple Oracle
database servers
8. Use Case: Access Logs
8
Insert Screenshot – can be dashboard, report, etc. Can add
as many as needed to explain how you’re using Splunk
Dashboard
provides
overview of
authentication
and
authorization
actions by
applications
9. Why Splunk?
Cost savings:
– One solution for security investigation, compliance
reporting and program integrity issue detection
Increased visibility
Flexibility:
– Ability to integrate data sources without help of an
application development team
– 450 custom reports
Fast time to value:
– Only took 4-6 months to implement
9
“Our client is very
happy with the results.
It would be hard to
convince them to get
rid of Splunk – they are
very, very impressed. ”
12. Advanced Threats Are Hard to Find
“Another Day, Another Retailer in a Massive
Credit Card Breach”
– Bloomberg Businessweek, March 2014
“Edward Snowden Tells SXSW He'd Leak
Those Secrets Again”
– NPR, March 2014
“Banks Seek U.S. Help on Iran Cyber attacks”
– Wall Street Journal, Jan 2013
Cyber Criminals
Nation States
Insider Threats
12
Source: Mandiant M-Trends Report 2012/2013/2014
100%
Valid credentials were used
40
Average # of systems accessed
229
Median # of days before detection
67%
Of victims were notified by
external entity
13. Attackers & Threats Have Changed & Matured
13
• Goal-oriented
• Human directed
• Multiple tools, steps & activities
• New evasion techniques
• Coordinated
• Dynamic, adjust to changes
People
• Outsider (organized crime, competitor,
nation/state)
• Insiders (contractor, disgruntled employee)
Technology
• Malware, bots, backdoors, rootkits, zero-day
• Exploit kits, password dumper, etc.
Threat
Process
• Attack Lifecycle, multi-stage, remote controlled
• Threat marketplaces – buy and rent
14. Modern Security Program Needs More than Technology
14
People
• Outsider (organized crime, competitor,
nation/state)
• Insiders (contractor, disgruntled employee)
Technology
• Malware, bots, backdoors, rootkits, zero-day
• Exploit kits, password dumper, etc.
Threat
Technology
• Firewall, Anti-malware, AV, IPS, etc.
• Anti-spam, etc.
Solution
Process
• Attack Lifecycle, multi-stage, remote controlled
• Threat marketplaces – buy and rent
Human
Intuition and Observation
Coordination, Collaboration
and Counter Measures
15. New Approach to Security Operations is Needed
15
• Goal-oriented
• Human directed
• Multiple tools & activities
• New evasion techniques
• Coordinated
• Dynamic (adjust to changes)
Threat
• Analyze all data for relevance
• Contextual and behavioral
• Rapid learning and response
• Leverage IOC & Threat Intel
• Share info & collaborate
• Fusion of technology, people
& process
16. From Alert Based to Analytics Driven Security
16
Traditional Alert-based Approach
Time & Event based
Data reduction
Event correlation
Detect attacks
Needle in a haystack
Power Users, Specialist
Additional Analysis Approach
..and phase, location, more…
Data inclusion
Multiple/dynamic relationships
Detect attackers
Hay in a haystack
Everyone - Analytics-enabled Team
17. Splunk software complements, replaces and goes beyond traditional SIEMs.
Moving Past SIEM to Security Intelligence
Small Data. Big Data. Huge Data.
SECURITY &
COMPLIANCE
REPORTING
REAL-TIME
MONITORING OF
KNOWN THREATS
DETECTING
UNKNOWN
THREATS
INCIDENT
INVESTIGATIONS
& FORENSICS
FRAUD
DETECTION
INSIDER
THREAT
18. Machine Data Enables Security and Business Insights
18
Order ID
Customer’s Tweet
Time Waiting On Hold
Product ID
Company’s Twitter ID
Order ID
Customer ID
Twitter ID
Customer ID
Customer ID
Twitter
Care IVR
Middleware
Error
Order Processing
Sources
21. Insider Threat
21
The CERT Top 10 List for Winning the Battle Against Insider Threats
Dawn Cappelli, Software Engineering Institute, Carnegie Mellon University, 2012
Non-tech indicators
HR
HDFS
SAP
Time
Management
Asset DB
Dunn &
Bradstreet
Lexus
Nexus
Traditional Data
Threat
Intelligence
User &
Identity
Network &
malware
Host &
Application
22. Human expertise fused with the power of
correlation and visualization technology are
key to detecting the unknowns
22
23. Visual Investigations for All Users
Visually organize and fuse any
data to discern any context
Giving users the ability to find
relationships visually
23
24. Enhance Security Analysis with Threat Intelligence
Integrate high fidelity and
complex URL’s and domain
names into threat
intelligence
Aggregation, de-duplication
and prioritization of
multiple feeds
Assign weights to the
business value of the feeds
24
29. Leverage a Rich Eco System
29
Security Intelligence platform
200+
SECURITY APPS/ADD-ONS
SPLUNK FOR
ENTERPRISE SECURITY
Cisco
WSA, ESA,
ISE, SF
Palo Alto
Networks
FireEye DShield
DNS
OSSEC
VENDOR COMMUNITY
CUSTOM APPS
Symantec
ADDITIONAL
SPLUNK APPS
…
Threat
Stream
30. Analytics Driven Security –
Empowering People and Data
A security intelligence platform should enable
any Security Program to leverage Technology,
Human Expertise, and Business/IT Processes in
the most effective way to deliver on security
30
31. 31
Why Splunk?
Integrated, Holistic & Open
• Single product & data store
• All original machine data is
indexed and searchable
• Open platform with API, SDKs,
+500 Apps
Flexible & Empowering
• Schema on read
• Search delivers accurate, faster
investigations and detection
• Powerful visualizations and
analytics help identify outliers
Simplicity, Speed and Scale
• Fast deployment + ease-of-
use = rapid time-to-value
• Runs on commodity hardware,
virtualized and/or in the cloud
• Scales as your needs grow
All Your Data in One Place:
Increases Collaboration and Partnership, Eliminates Silos & Delivers Proven ROI
#2: Glenn – can you please update your title and add anyone else presenting with you?
#8: You can add as many screen shots as you like – this is where you’d discuss your specific use case(s)
#13: The number of threats is increasing and also becoming more advanced. Today’s advanced threats are stealthy and sophisticated and evade detection from traditional, point security products that look for specific threat signatures. Above are 3 types of advanced threats. They are good at stealing confidential data, whether it be credit cards or IP, and many of their victims unfortunately end up in the headlines.
Cyber criminals include the credit card theft at Target and Neiman Marcus. Nation state attacks include Iran and China attacking governments and private sector companies to steal intellectual property and/or national secrets.
FYI these advanced threats are also commonly called APTs, or Advanced Persistent Threats.
APT are hard to detect because they are not signature-based and hide behind legitimate credentialed activity to evade detection from traditional, point security products. Every year companies like Mandiant produce reports that describe the trends identified based on the breach investigation work that they do as part of their consulting practices. There are a couple metrics that I found interesting reading their recent reports.
100% is often via stealing password hashes or using keyloggers. Often they steal admin-level credentials so they can access many other systems and not be detected.
The 40 implies that even if you see malware in one place, you need to look much further as there are likely multiple infected machines and backdoors
243 days shows how they can evade detection for months at a time. They move slow and low and do not set off alarms from point, signature-based security products like anti-malware solutions.
63% of victims were notified by an external entity. Notification usually starts with customer complaints like bank account drained or credit card maxed out. Often FBI informs them.
#17: Concept is that NEW analysis is required – beyond simple event correlation – this is why SIEMs are not solving the problem – the requires have changed
Phase, location, etc. – speak to additional attributes are required to both understand and to defend against attacks
Data inclusion – core splunk message – don’t filter/tune out noise/false positive, look at all data, collect so it’s available when needed
Multiple/dynamic relationships – the event chain and bits of any attack are scattered, and cannot be detected using pre-defined correlation rules – example of multiple login failure with success and then access to internal resources – great for gaining an advantage, but then what happens when they download additional malware – how does static correlation rules help find the new malware, or how does it look for potential data that is accessed/stolen.
Detect attackers – main concept is there is an attacker directing the malware (once internal access is established via valid credentials, therefore the attacker must be deduced from activities associated with normal activities from those trusted credentials) - once the malware is delivered, the additional attack tools and activities will not be “attacks” anymore, then are activities of the attacker
Hay in a haystack – needle is a different object from hay – but now, since trusted credential are used, and often in normal, good traffic – the analysis is to look for particular attributes and characteristics of the hay to determine good/bad – this applies to concepts like insider threat is an insider with access (account privileges, etc.), and fraud uses good access (credit card, accounts, etc.) – the identifiable traits are their activities, characteristics, etc.
#18: Make sure to stress we are a Security Intelligence Platform and we can meet their needs these use cases plus more. We are more than a SIEM in that we are much more flexible and also can be used for use cases outside of security. Do not go into detail on the 5 use cases because the next few slides detail each of them. And highlight that many customers already have a SIEM and are generally happy with it. But they do have some pain with current SIEM….maybe it struggles getting in non-security data, maybe it has limited search/reporting capabilities, etc. In these cases, Splunk can happily complement their SIEM. They perhaps use their existing SIEM for alerting, and they then log into Splunk to do the investigation, etc. But key point is that we can easily complement or replace a SIEM.
#21: Key part of IT security is protecting confidential data. Which means detecting advanced threats, like cybercriminals or malicious insiders, before they can steal your data. To detect or investigate them, you need non-security and security data because advanced threats avoid detection from signature-based security products; the fingerprints of an advanced threat often are in the “non-security” data. Most traditional SIEMs just focus on gathering signature-based threats which do *not* have the fingerprints of advanced threats.
Also the above scenario is worse if there is no SIEM. Instead point UIs and grep are used and aggregating data is very manual and time consuming.
#22: Insight for Insider threats comes both traditional data sources used for security AS WELL AS FROM non-traditional, often from HR, personnel and other “people-oriented” data.
#30: 1 solution for Splunk for Security, but 3 offerings. At bottom is Splunk Enterprise, our core product. Every Splunk deployment includes this as this is where the core indexing and searching resides. Many customers build their own searches/reports/dashboards on top of it.
On top of it, optional Apps can be installed. Apps are basically a collection of reports, dashboards, and searches purpose-built for a specific use case or product. Can be built by Splunk, customer, partners and all but a few are free on Splunkbase. Apps are great for customers who want out-of-the-box content and do want to have to build it themselves, and want to extend point solutions. One key App is the Splunk-built Enterprise Security app with the arrow pointing at it. It is basically an out-of-the-box SIEM with reports, dashboards, correlation rules, and workflow for security use cases. (It does have a cost though) Besides this app there are over 80 security-centric free Apps on Splunkbase. These are offering 3.
The majority of Splunk security customers do Splunk Enterprise and the free apps. Also customers do leverage the API and SDKs that come with Splunk to further extend the platform.
#34: 3:45pm – Bert: Moderate Q&A
REMEMBER: Check the presenter pod to ensure Deloitte has not asked you to skip any questions
NEXT:
3:55pm – Close session:
Thank our presenters
Hand it over to Alicia to close and mention Splunk’s upcoming events
#35: 3:55pm – Close session:
Thank our presenters
Hand it over to Alicia to close and mention Splunk’s upcoming events