Enabling FCEV Agencies to Enact BOD 23-01
Binding Operational Directive (BOD) 23-01 applies to all IP-addressable networked assets that can be reached over IPv4 and IPv6 protocols. Most agencies have worked for many years to understand their IT assets and vulnerabilities, but few have focused on OT and IoT assets and hyperconnected facilities. OT technologies encompass a wide range of machines and configurations, as well as safety, monitoring, and control systems that enable or report...
Using Splunk Tools for Public Safety ...
At Splunk we turn your criminal investigation data into law enforcement action. The sheer amount and breadth of data common to a modern investigation can be overwhelming, especially if the analysis of that data is across different tools or is a manual exercise. Splunk provides a centralized platform to correlate data, perform advanced analytics to various data sources and apply built-in AI to quickly identify unusual behaviors or anomalies. In...
Leveraging Splunk's Free Apps for the Army
Splunk's app store, Splunkbase, has over 2,000 free applications and add-ons that provide out-of-the-box dashboards, reports, and alerts allowing you to easily view and make sense of your data. Join us on November 17th, where we will be reviewing the most common apps used throughout the Army and how to use them. We will share how these apps provide dashboard analytics for IT, cybersecurity, and compliance use cases. During this webinar, we wil...
Security Programs That Thrive in Econom...
With economic conditions causing concerns, many security teams with limited resources are sacrificing security initiatives for cost containment. All while expanding attack surfaces are requiring more time and attention than ever before. If this problem sounds familiar, join us to learn how managed detection and response solutions, integrated with existing security investments, can more quickly establish an acceptable ROI while dramatically re...
One Monitoring Tool to Rule Them All -...
Join us for a walkthrough of Splunk's newest feature. Visibility over distributed infrastructure is a huge problem for most of our city and state customers. With the move to hybrid infrastructure, the need for a solution that can monitor both private data centers and cloud deployed infrastructure has been at the forefront of all of our customer conversations. Register now to learn: What Observability is, and what it means for monitoring About...
Splunk JSP Workshop
Join us for session 1 of our Splunk JSP workshop where attendees will gain hands-on Splunk training to assist in future mission success.AgendaTimeTopic & Description9:00am - 9:15amKick-off: The Splunk team will kick-off what to expect over the day.9:00am - 12:00pmSplunk for Rookies: In this workshop, we will walk through a series of exercises designed to get someone new to Splunk to the point where they understand what Splunk is and what i...
CMMC Compliance Affecting Higher Ed
Don’t let CMMC jeopardize your research funding! Let Splunk and Qmulos do the heavy lifting for you. You’ve got the funding. We’ve got the solution. Qmulos is excited to be hosting a virtual thought leadership discussion, regarding CMMC 2.0, and how using the right technology stack can simplify and ensure security measures. As CMMC adoption progresses, leaders will increasingly depend on real-time, continuous assessment and c...
October 20, 2022
Organizer:
Qmulos Location:
Webcast
Splunk Security Ninja Workshop EMEA Ser...
Please note these workshop take place during European working hours. Welcome to Splunk Security Ninja Workshop Series. These 4 hour, hands-on security workshops are brought to you by the Splunk team via Zoom. Learn, connect & interact with Splunk subject matter experts, colleagues and industry peers, and have some fun on the way! Google Cloud Platform Security This is a scenario-based hands-on workshop designed for Splunk security customer...
September 28, 2022
Organizer:
Splunk Location:
Virtual
Leveraging Splunk for RMF Compliance ...
The RMF process is carried out as a set of well-defined, risk-related tasks by individuals or groups with well-defined roles within the organization. Splunk can be leveraged to assist agencies in facilitating and enabling their RMF process, specifically with Steps 4 (Assess) and 6 (Monitor). Join us for a walk-through on how to leverage this powerful big data solution for real-time reporting and alerting based on machine data aggregation from...
Financial Agencies: Improve Anomaly Det...
The phrase "insider threat" often evokes not only headaches, but the mental image of a disgruntled coworker scheming on how best to bring an organization to a grinding halt. While this is absolutely an example of an insider threat, there is way more to an insider threat program than looking for web searches on "how to steal money from my employer like they did in Office Space and/or Superman 3."In this session, engineers from Splunk will revie...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.