![]() conf23 before you arrive in Las Vegas, you’ll be able to hit the ground running and get the most out of your. Why create your schedule now? By creating your plan for. Not sure where to begin? Leverage learning paths: pre-planned schedules based on role, product or experience. conf23 and are excited to announce that the session scheduler is now available. Explore sessions by track, industry, product, and/or session type, and start building your dream. Detecting Bank Account Takeover and Fraud Cyber Attacks with Splunkįor all presentations (recordings and slides), please visit the conference website.We’re counting down the weeks to.Royal Caribbean Cruise Lines: Centralizing Cybersecurity and Leveraging DNS Data to Identify Malware “Patient Zero”. ![]() Indicators to Adversaries – Intrusion Analysis Using the Diamond Model.Orrstown Bank: Using Splunk Cloud and Anomaly Detection Capabilities To Fight a Billion Dollar Fraud Problem.Breach Management in Splunk App for Enterprise Security.Building an Enterprise-grade Security Intelligence Platform at.Turning Indicators of Compromise into Tangible Protection.Security Ninjutsu Part Two: More Security Analytics, Correlation and Action!.conf stuff? Simply pick one below (recordings only). Still eager for more security related Splunk. In this presentation, the creator of the ubberAgent – – describes how to make the most of data models in great detail. Building Your App on an Accelerated Data Model ( recording / slides).Now, try not watching the entire presentation and thank Dan Aiello. Just do the following: browse the video recording and skip to around 30′ (magic!). Kudos to Duane Waddle and Splunk Search Pro Tips ( recording / slides) Wanna know about the challenges with CSV Lookups and KV store in big deployments? Stop here. Beyond the Lookup Glass: Stepping Beyond Basic Lookups ( recording).A lot of use cases for Security here as well. Just have a quick look on the slides to see what I mean. If you are into ML and the likes of R programming, the app presented here will definitely catch your attention. Machine Learning and Analytics in Splunk ( recording / slides).Want to provide him feedback? Martin is often found at IRC, join #splunk and say ‘Hi’! Martin gives an a-w-e-s-o-m-e presentation on Knowledge Objects, unraveling what happens under the hood when using tags and eventtypes. Optimizing Splunk Knowledge Objects – A Tale of Unintended Consequences ( recording / slides).Now, in case you are not into Security but also enjoy watching hardcore, techie talks, here’s my TOP 5 list: This talk was delivered by Splunkers and They presented an example on how to build custom content on top of ES to enhance the context around an asset, which is packed to an app available at GitHub. Build A Sample App to Streamline Security Operations – And Put It to Use Immediately ( recording).Building a Cyber Security Program with Splunk App for Enterprise Security ( recording / slides)Įnterprise Security (ES) app relies heavily on accelerated data models, so besides interesting tips on how to leverage ES, Jeff Campbell provides ways to optimize your setup, showing what goes under the hood.Don’t forget to provide feedback to Ryan Kovar and Steve Brant, I’m sure they will like it. If you are looking for concrete security use case ideas to build based on DNS data, that’s a gold. Hunting the Known Unknowns (with DNS) ( recording / slides).really knows his stuff, which is not a surprise for someone calling himself a Malware Archaeologist. This presentation is a must for those willing to monitor Windows events either via native or 3rd party endpoint solutions. Finding Advanced Attacks and Malware with Only 6 Windows EventIDs ( recording / slides).The presenters ( ltawfall / rj_chap) discussed some interesting use cases and provided a lot of input for those willing to make Splunk their nerve center for security. That’s the coolest customer talk from the ones I could watch. Security Operations Use Cases at Bechtel ( recording / slides).The list is not sorted in any particular order and, whenever possible, entries include presenters’ Twitter handles as well as takeaways or comments that might help you choose where to start. If you are into Security and didn’t have an opportunity to attend the Splunk conference in Las Vegas this year (maybe you’re busy playing Blackjack instead?), here’s what you can not miss.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |