Splunk Security Ninja Workshop EMEA Ser...
Please note these workshop take place during European working hours. Welcome to Splunk Security Ninja Workshop Series. These 4 hour, hands-on security workshops are brought to you by the Splunk team via Zoom. Learn, connect & interact with Splunk subject matter experts, colleagues and industry peers, and have some fun on the way! Google Cloud Platform Security This is a scenario-based hands-on workshop designed for Splunk security customer...
September 28, 2022
Organizer:
Splunk Location:
Virtual
Leveraging Splunk for RMF Compliance ...
The RMF process is carried out as a set of well-defined, risk-related tasks by individuals or groups with well-defined roles within the organization. Splunk can be leveraged to assist agencies in facilitating and enabling their RMF process, specifically with Steps 4 (Assess) and 6 (Monitor). Join us for a walk-through on how to leverage this powerful big data solution for real-time reporting and alerting based on machine data aggregation from...
Financial Agencies: Improve Anomaly Det...
The phrase "insider threat" often evokes not only headaches, but the mental image of a disgruntled coworker scheming on how best to bring an organization to a grinding halt. While this is absolutely an example of an insider threat, there is way more to an insider threat program than looking for web searches on "how to steal money from my employer like they did in Office Space and/or Superman 3."In this session, engineers from Splunk will revie...
Splunk Security for NPOs Virtual Worksh...
This hands-on virtual workshop is designed to familiarize participants with how to leverage Splunk to search security events. Splunk experts will provide users a way to gain familiarity with searching in Splunk, as well as introducing a set of commands that allow users to effectively examine their security events. We will leverage the popular Boss of the SOC (BOTS) dataset in a question-and-answer format. Join us for a virtual workshop where a...
Solving STIGs and Automating Compliance...
Federal security professionals within the DoD must comply with the technical testing and hardening frameworks known as STIGs -- Security Technical Implementation Guides. STIGs contain technical guidance for "locking down" or "hardening" information systems and software that might be vulnerable to a malicious computer attack.While security is perhaps the single most important task federal IT professionals tackle, it's also the most complex. The...
Achieve Governance and Visibility with...
Organizations face rapidly changing demands and increasingly agile procurements as the pace of technology innovation continues to accelerate. They encounter costly legacy software licensing and maintenance, drawn out procurement cycles that can inhibit innovation, and a lack of visibility into organizational software usage. Modern organizations rely on digital transformation to streamline the software supply chain, optimize productivity, accel...
Better Visibility & Troubleshooting for...
Higher education institutions were forced to accelerate their digital journeys during the pandemic to better serve students, faculty, and staff. How can you ensure critical systems and applications, like the Student Information and Learning Management systems, remain operational and ready for what's next? The answer: understanding the power of your data.Join us to learn strategies to monitor your critical systems, with a special focus on Splun...
Cybersecurity Executive Order: Essentia...
Federal staff are under increasing pressure to modernize their security operations and fortify networks. To address the recurring and future cyber threats to trusted agency operations and service delivery, the Administration recently issued an aggressive cybersecurity Executive Order (EO) that requires all Federal Government organizations to revisit their cybersecurity infrastructures. Following the May 2021 EO, the Administration released add...
August 9, 2022
Organizer:
Splunk Location:
Webcast
Solving STIGs and Automating Compliance...
Federal security professionals within the DoD must comply with the technical testing and hardening frameworks known as STIGs - Security Technical Implementation Guides. STIGs contain technical guidance for "locking down" or "hardening" information systems/software that might be vulnerable to a malicious computer attack. While security is perhaps the single most important task federal IT professionals tackle, it is also the most complex. There...
From Reactive to Proactive: Getting Mor...
Registration is Closed With more people online than ever before, delivering great user-experience is more critical than ever. Since uptime and page performance directly impact digital business results, it's important to measure the impact of code on user-experience. Splunk Synthetic Monitoring is a best-in-class solution to help proactively find, fix, and prevent performance issues from impacting customers. See Splunk's ability to help priorit...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.