Copyright	©	2016	Splunk	Inc.
Building	the	Analytics	
Driven	SOC
Girish Bhat
2
Safe	Harbor	Statement
During the course of this presentation, we may make forward looking statements regarding future events
or the expected performance of the company. We caution you that such statements reflect our current
expectations and estimates based on factors currently known to us and that actual events or results could
differ materially. For important factors that may cause actual results to differ from those contained in our
forward-looking statements, please review our filings with the SEC. The forward-looking statements
made in this presentation are being made as of the time and date of its live presentation. If reviewed
after its live presentation, this presentation may not contain current or accurate information. We do not
assume any obligation to update any forward looking statements we may make. In addition, any
information about our roadmap outlines our general product direction and is subject to change at any
time without notice. It is for informational purposes only and shall not be incorporated into any contract
or other commitment. Splunk undertakes no obligation either to develop the features or functionality
described or to include any such feature or functionality in a future release.
3
3
> Dave Herrald dherrald@splunk.com|@daveherrald
- Senior Security Architect, Splunk Security
Practice
- 20+ years in IT and security
-Information security officer, security architect,
pen tester, consultant, SE, system/network
engineer
- GIAC GSE #79, former SANS Mentor
#	whoami
Agenda
4
A	look	at	traditional	
security	operations
1
Best	practices	and	
emerging	trends
2
The	security	ops	
technology	stack
3
Splunk	and	the	
Analytics	Driven	
SOC
4
5
Splunk	– Leader	in	Security
Company	(NASDAQ:	SPLK)
• Founded	2004,	first	software	release	in	2006
• HQ:	San	Francisco	/	Regional	HQ:	London,	Hong	Kong
• Over	2,000	employees,	based	in	12	countries
Business	Model	/	Products
• Free	download	to	massive	scale
• Splunk	Enterprise,	Splunk	Cloud,	Splunk	Light
• Splunk	Enterprise	Security,	User	Behavior	Analytics
12,000+	Customers
• Customers	in	100	countries
• 80+	of	the	Fortune	100
• Largest	license:	Over	1 Petabyte	per	day
6
Splunk:	The	Platform	for	Machine	Data
Developer
Platform
Report	
and	
analyze
Custom	
dashboards
Monitor	
and	alert
Ad	hoc	
search
Online	
Services
Web	
Proxy
Data	Loss	
Prevention
Storage Desktops
Packaged	
Applications
Custom
Applications
Databases
Call	Detail	
Records
Smartphones	
and	Devices
Firewall
Authentication
File	
servers
Endpoint
Threat
Intelligence
Asset	
&	CMDB
Employee	/	
HR	Info
Data
Stores
Applications
External	Lookups
Badging	
records
Email	
servers
VPN
7
Splunk	Security	Solutions
SECURITY	&										
COMPLIANCE	
REPORTING
MONITORING	OF	
KNOWN	THREATS
ADVANCED	AND	
UNKNOWN	
THREAT	
DETECTION
INCIDENT	
INVESTIGATIONS	&	
FORENSICS
FRAUD	
DETECTION
INSIDER	
THREAT
MORE
…
SECURITY	APPS	&	ADD-ONS SPLUNK	
USER	BEHAVIOR	ANALYTICS
Wire	data
Windows		= SIEM	integration
RDBMS	(any)	data
SPLUNK	
ENTERPRISE	SECURITY
SPLUNK	
APP	FOR	PCI
8
Source	:	EY	Global	Information	Security	Survey	2015
9
How-to	guides…
Traditional	Security	
Operations
11
Traditional	Security	Program:		The	Big	Picture
1
12
Traditional	Security	Program:		The	Big	Picture
1
It’s	complicated…
13
Traditional	Security	Critical	Path
13
Risk	&	
Compliance
Security	
Architecture
Security	
Engineering
Security	
Operations	
(Includes	SOC)
Security	Operations:	part	of	the	bigger	picture…
14
Traditional	SOC
“Alert	triage”
“Alert	pipeline”
15
What	is	a	SOC?
● A place?
● A person	or	a	team?
● A set	of	practices?
● A	set	of	tools?
16
Security	Operations
The	organizational	capability	to	detect	
and	respond	to	threats.
17
A	SOC	by	any	other	name…
The	organizational	capability	to	detect	
and	respond	to	threats.
● VSOC
● Cyber	Defense	Center
● Cyber	Fusion	Center
● Cybersecurity	Operation	Center
● Multifunction	NOC/SOC
● Command	SOC
● Crew	SOC?
https://www.gartner.com/doc/3479617
18
Three	Interrelated	Components	of	Security
1
Process
PeopleTechnology
19
Bottom	Line
Technology	exists	to	serve	people	and	processes.
20
Challenges	with	the	traditional	SOC	(1)
Efficacy
21
Challenges	with	the	traditional	SOC	(2)
Staffing
22
Challenges	with	the	traditional	SOC	(3)
Remember	
this?
Risk	&	
Compliance
Security	
Architecture
Security	
Engineering
Security	
Operations	
(Includes	SOC)
23
Challenges	with	the	traditional	SOC	(3)
Silo-ization
24
Challenges	with	the	traditional	SOC	(4)
Cost
…and	opportunity	cost
Trends	in	Security	
Operations
26
New	Capabilities	in	the	SOC
● Alert	Management
● Incident	Response
● Toolchain	engineering
● Threat	intelligence	
(consumption	and creation)
● Threat	hunting
● Vulnerability	management
● Red	team
SOC++
Alert	
Management
IR	/	CSIRT
Toolchain	
Engineering
Threat	intelHunting
Vuln.	
Management
Red	Team
27
What	About	Managed	Security	Services?
● Alert	Management
● Incident	Response
● Toolchain	engineering
● Threat	intelligence	
(consumption	and creation)
● Threat	hunting
● Vulnerability	management
● Red	team
SOC++
Alert	
Management
IR	/	CSIRT
Toolchain	
Engineering
Threat	intelHunting
Vuln.	
Management
Red	Team
28
Automation	in	the	SOC
• Response	– maybe
• Context	gathering	– definitely	
• Automate	“Tier	1”
• Places	a	high	premium	on	
toolchain	integration
29
Processes	in	the	SOC
https://conf.splunk.com/files/2016/slides/maturing-workdays-soc-with-splunk.pdf
30
Maturing	Use	of	Threat	Intelligence
Threat	list	+ raw	network data	=
DNS
web	proxy
email
endpoint
…
The	“Threat	list	wind	tunnel”
31
Effective	Threat	Intelligence	Consumption
alerts		+		threat	intel	 =			insight
Hunting New	detection	
mechanism
32
Network	(Meta)data
33
Network	(Meta)data
NetFlow	(or	variant)
Succinct
5-tuple	+	traffic	size
Easytm
to	analyze
Good	context	for	buck
No	payload
PCAP
Voluminous
Ground	truth
Lots	of	storage	/	overhead
Ultimate	context
Full	payload
Stream	/	Bro
Succinct
5-tuple	+	traffic	size
Easily	searchable!
Tune-able
Adaptive	fidelity
Customizable
Payload	elements
34
Threat	Hunting	(Active	Defense)
…effort	by	analysts	who	purposely	set	
out	to	identify	and	counteract	
adversaries	that	may	already	be	in	the	
environment.	
https://www.sans.org/reading-room/whitepapers/analyst/who-what-where-when-effective-threat-hunting-36785
35
How	are	SOC	Teams	Hunting?
https://www.sans.org/reading-room/whitepapers/analyst/who-what-where-when-effective-threat-hunting-36785	
● Start	with	a	hypothesis that	considers:
§ Assets	(often	crown	jewels)
§ Threats
§ Vulnerabilities
§ Countermeasures
● Requires	lots	of	data
● Flexible	platform	to	ask/answer	questions
● Data	science	/	ML	/	Analytics
36
How	are	SOC	Teams	Hunting?
https://www.sans.org/reading-room/whitepapers/analyst/who-what-where-when-effective-threat-hunting-36785	
Most	important,	hunters	are	
innovative	analysts	who	understand	
their	threat	landscape	and	their	
organization	well	enough	to	ask	the	
right	questions	and	find	the	answers.
37
Data	Science,	ML,	and	Analytics
The	Security	
Operations	Toolchain
39
Log	Data	Platform
• Single	source	of	truth
• Retention	and	integrity
• Any	data	source
• Easy	correlation	
• Automation	/	integration
• Performant	and	scalable
• Full	fidelity	
• Normalized?
• Hunting
• Forensic	investigation
• Alerting
• Dashboards
• Visualization
• Analytics	(ML?)
Data	Normalization	is	Mandatory	for	your	SOC
“The	organization	consuming	the	
data	must	develop	and	consistently	
use	a	standard	format	for	log	
normalization.”	– Jeff	Bollinger	et.	
al.,	Cisco	CSIRT
Your	fields	don’t	match?	Good	luck	
creating	investigative	queries
41
Asset	Inventory	and	Identity	Data
Often	multiple	sources	of	record	– that’s	OK
• CMDB,	Vuln scans,	Passive	detection,	DHCP,	NAC
• Active	directory,	LDAP,	IAM
Network	diagrams
Categorization	
• PCI,	ICS,	Administrative,	Default,
Comprehensive	yet	lightweight	and	easy	to	maintain
Must	be	easy	to	correlate	to	log	data
42
Case	and	Investigation	Management
• Ticketing	system
• Workflow
• Supports	prioritization
• Supports	collaborative	investigation
• Provides	metrics
• Supports	automation
• Auditable
43
Common	SOC	Data	Sources
• Firewall
• Network	metadata
• Authentication
• Server
• Windows	/	Linux
• Endpoint	
• EDR,	AV,	HD/RAM	images
• IDS	/	IPS
• VPN
• Application
• Threat	intel
• Vulnerability
• Assets	and	Identities
Splunk	as	the	Security	
Operations	Nerve	Center
45
Splunk	as	the	Security	Operations	Nerve	Center
46
1.	Adopt	an	Adaptive	Security	Architecture
To	Prevent,	Detect,	Respond and	Predict	need:
- Correlation	across	all	security	relevant	data
- Insights from	existing	security	architectures
- Advanced	analytics	techniques	such	as	machine	learning
Platform	for	Operational	Intelligence
4000+	Apps	
and	Add-Ons
Splunk	Security
Solutions
47
2.	Threat	Intelligence	– Splunk	Threat	Intel	Framework	
Automatically collect,	
aggregate	and	de-duplicate	
threat	feeds	from	a	broad	set	
of	sources	
Support	for	STIX/TAXII,	
OpenIOC,	Facebook	and	more
Build	your	own	data	to	create	
your	own	Threat	Intel
Out	of	the	box	Activity and	
Artifact dashboards
Prioritize,	contextualize	and	
analyze	threats	and	remediate
Law	Enforcement	
Feeds
ISAC	Feed
Agency	Feeds
Commercial	
Service
Community	
Feed
Open-Source
Feed
Other	Enrichment	
Services
• Monitor	and	triage	alerts
• Determine	impact	on	
network,	assets
• Use	for	analysis	/	IR
• Collect	/	provide	forensics
• Use	to	hunt	/	uncover	/link	
events
• Share	info	with	partners
48
3.	Use	Advanced	Analytics	– Native	ML	and	UBA
Simplify	detection	and	focus	on	real	alerts
Accelerate	anomaly	and	threat	detection	– minimize	attacks	and	insider	threat
Use	Machine	Learning	toolkit	- solutions	to	suit	your	workflow
Premium	Machine	learning	solution	- User	Behavior	Analytics
– Flexible	workflows	for	SOC	Manager,	SOC	analyst	and	Hunter/Investigator	within	SIEM
49
4.	Proactively	Hunt	and	Investigate	- Considerations
● Organizational	maturity
● Domain	and	product	experience
● Tools:	Network,	Endpoint,	Threat	Intel,	Access
● Security	relevant	data,	historical,	raw	data	
● Flexibility	and	ad	hoc
50
5.	Automate	whenever	feasible
App Servers
Network
Threat	Intelligence
Firewall
Internal	Network	
Security Endpoints
Use	rules	and	machine	learning	to	
automate	routine	aspects	of	
detection	and	investigation	
Extract	insights from	existing	security	
stack	by	use	of	common	interface	
Take	actions	with	confidence	for	
faster decisions	and	response
Automate	any	process	along	the	
continuous	monitoring,	response	&	
analytics	cycle
Splunk	Adaptive	Response
51
What	is	Splunk	Enterprise	Security?
5
Enterprise	Security
Asset	and	
Identity	
Correlation
Notable	
Event
Threat	
Intelligence
Risk	
Analysis
Adaptive	
Response
A	collection	of	Frameworks
52
Splunk	Security	Partners
https://www.splunk.com/partners/
Customer	Success
54
Building	an	Intelligence	Driven	SOC
Challenges	
• Existing	SIEM	not	adequate	- struggled	to	bring	in	appropriate	data	
• Unable	to	perform	advanced	investigations,	severe	scale/performance	issues
• Looking	to	build	a	new	SOC	with	modern	solution
Customer	Solution
• Centralized	logging	of	all	required	machine	data	at	scale	and	full	visibility
• Retain	all	relevant	data	from	10+	data	sources which	is	used	by	25+	SOC/CSIRT	users
• Tailored	advanced	correlation	searches	&	IR	workflow	
• Faster	and	deeper	incident	investigations
• Greater	SOC	efficiencies - all	SOC/CSIRT	working	off	same	UI/data
• Executive	dashboards	to	measure	and	manage	risk
54
55
Citywide	SOC	for	situational	awareness
Challenges
• Slow	responses	to	security	incidents	
• Inadequate	situational	awareness	of	security	events	
• Limited	threat	intelligence	
• Disparate	logs	from	over	40	departments	were	difficult	to	aggregate	
Customer	Solution	:	Splunk	Cloud	with	Enterprise	Security
• Real-time,	citywide,	24/7	network	surveillance	
• Stronger	protection	of	digital	assets	and	infrastructure	
• Shared	threat	intelligence	with	federal	agencies
• Reduced	headcount	and	lower	operational	costs
56
Build	an	insourced	SOC	in	months
Challenges
• Wide	range	of	security	requirements
– Internal	audits	(financial,	PCI)
– Protect	internal	info	and	assets
– Cloud	firewall,	DDOS
• Cultural	and	Organizational
– Security	not	a	priority,	Outsourced	SecOps
– Information	hoarding	and	data	silos
Customer	Solution	:	Splunk	Enterprise	Security
• Changed	culture	- security	first	mindset	with	controls
• Detect,	prevent	and	respond	to	attacks	in	own	
environment,	with	24/7	security	analysis	of	customers
• Rapid	detection	and	deep	investigation
• Detect	Web	App	attacks,	discover	compromised	cards
57
Maturing	SOC
Challenges
• Legacy	SIEM	:	Unstable,	Inflexible,	Clunky
• Limited	skilled	resources
• High	false	negative	and	false	positive
Customer	Solution	:	Splunk	Cloud	with	Enterprise	Security
• Developed	processes	:	Rule	set,	naming
• SOC	process	:	Playbook,	training,	automated	documentation
• Enabled	SOC	to	identify	patterns	of		behavior	in	a	single	event	rather	than	
be	bombarded	by	thousands	of	low-value	incidents
Wrapping	up
Free
Cloud	Trial
Free	Software
Download
Free
Enterprise	Security
Sandbox
Get	started	in	minutes	– splunk.com
1 32
Copyright	©	2016	Splunk	Inc.
• 5,000+	IT	and	Business	Professionals
• 175+	Sessions	
• 80+	Customer	Speakers
PLUS	Splunk University
• Three	days:	Sept	23-25,	2017
• Get	Splunk Certified	for	FREE!
• Get	CPE	credits	for	CISSP,	CAP,	SSCP
SEPT	25-28,	2017
Walter	E.	Washington	Convention	Center
Washington,	D.C.
CONF.SPLUNK.COM
The	8th Annual	Splunk	Worldwide	Users’	Conference
Copyright	©	2016	Splunk	Inc.
62
Can	I	play	BOTS?
62
Yes!
• RSA	Conference	2017
• Splunk	.conf	2017
• Online	/	continuous?	Stay	tuned
New	scenarios	
and	data	sets
63
Resources	Cited
How	to	Plan,	Design,	Operate	and	Evolve	a	SOC
https://www.gartner.com/doc/3479617
Crafting	the	InfoSec	Playbook
https://www.amazon.com/Crafting-InfoSec-Playbook-Security-Monitoring/dp/1491949406
Splunk	SOC	Advisory	Services
https://www.splunk.com/pdfs/professional-services/soc-advisory-services.pdf
Ten	Strategies	of	a	World-Class	Cybersecurity	Operations	Center
https://www.mitre.org/sites/default/files/publications/pr-13-1028-mitre-10-strategies-cyber-ops-center.pdf
Maturing	Workday’s	SOC	with	Splunk
https://conf.splunk.com/files/2016/slides/maturing-workdays-soc-with-splunk.pdf
The	Five	Characteristics	of	an	Intelligence	Driven	Security	Operations	Center
https://www.gartner.com/doc/3160820/characteristics-intelligencedriven-security-operations-center
The	Who,	What,	Where,	When,	Why	and	How	of	Effective	Threat	Hunting
https://www.sans.org/reading-room/whitepapers/analyst/who-what-where-when-effective-threat-hunting-
36785
Exploring	the	Frameworks	of	Splunk	Enterprise	Security
https://conf.splunk.com/files/2016/slides/exploring-the-frameworks-of-splunk-enterprise-security.pdf
Thank	you!
dherrald@splunk.com|@daveherrald

More Related Content

PPTX
Security operation center (SOC)
PDF
SIEM Architecture
PDF
Security operations center-SOC Presentation-مرکز عملیات امنیت
PPTX
SOC Architecture Workshop - Part 1
PDF
SIEM and SOC
PDF
From SIEM to SOC: Crossing the Cybersecurity Chasm
PDF
Soc and siem and threat hunting
PPTX
Threat Hunting - Moving from the ad hoc to the formal
Security operation center (SOC)
SIEM Architecture
Security operations center-SOC Presentation-مرکز عملیات امنیت
SOC Architecture Workshop - Part 1
SIEM and SOC
From SIEM to SOC: Crossing the Cybersecurity Chasm
Soc and siem and threat hunting
Threat Hunting - Moving from the ad hoc to the formal

What's hot (20)

PDF
Building a Next-Generation Security Operations Center (SOC)
PPTX
Security Operation Center - Design & Build
PPSX
Next-Gen security operation center
PDF
Rothke secure360 building a security operations center (soc)
PPTX
Beginner's Guide to SIEM
PDF
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
PPTX
Security Information and Event Management (SIEM)
PDF
Threat Modeling to Reduce Software Security Risk
PPTX
Security Operations, MITRE ATT&CK, SOC Roles / Competencies
PPTX
Security Information Event Management - nullhyd
PPTX
Roadmap to security operations excellence
PDF
What is SIEM? A Brilliant Guide to the Basics
PPTX
WHY SOC Services needed?
PPTX
PPT-Splunk-LegacySIEM-101_FINAL
PPTX
Splunk Phantom SOAR Roundtable
PPTX
Security operation center
PDF
Threat Hunting with Splunk Hands-on
PPTX
7 Steps to Build a SOC with Limited Resources
PDF
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
PPTX
An introduction to SOC (Security Operation Center)
Building a Next-Generation Security Operations Center (SOC)
Security Operation Center - Design & Build
Next-Gen security operation center
Rothke secure360 building a security operations center (soc)
Beginner's Guide to SIEM
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
Security Information and Event Management (SIEM)
Threat Modeling to Reduce Software Security Risk
Security Operations, MITRE ATT&CK, SOC Roles / Competencies
Security Information Event Management - nullhyd
Roadmap to security operations excellence
What is SIEM? A Brilliant Guide to the Basics
WHY SOC Services needed?
PPT-Splunk-LegacySIEM-101_FINAL
Splunk Phantom SOAR Roundtable
Security operation center
Threat Hunting with Splunk Hands-on
7 Steps to Build a SOC with Limited Resources
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
An introduction to SOC (Security Operation Center)
Ad

Viewers also liked (20)

PPT
SOC presentation- Building a Security Operations Center
PPTX
Building an Analytics - Enabled SOC Breakout Session
PDF
Workshop threat-hunting
PDF
Threat Hunting Workshop
PDF
Threat Hunting with Splunk
PPTX
Hunting on the cheap
PPTX
Building a Successful Threat Hunting Program
PPTX
Threat Hunting with Splunk
PPTX
Security Operations Center (SOC) Essentials for the SME
PDF
DTS Solution - Building a SOC (Security Operations Center)
PDF
Building Security Operation Center
PPTX
Threat Hunting with Splunk
PDF
GISS2016_Getting Started
PDF
5 Ways to Improve your Security Posture with Splunk Enterprise Security
PPTX
SharePoint Search Secrets for Power Users & Administrators - Mike Smith
PPTX
Splunk for Monitoring and Diagnostics in the Industrial Environment
PDF
Operationalizing Customer Centricity: A Prescription for Building Brand Loyal...
PDF
Marketo Customer Presentation
PPTX
Operational Security Intelligence
SOC presentation- Building a Security Operations Center
Building an Analytics - Enabled SOC Breakout Session
Workshop threat-hunting
Threat Hunting Workshop
Threat Hunting with Splunk
Hunting on the cheap
Building a Successful Threat Hunting Program
Threat Hunting with Splunk
Security Operations Center (SOC) Essentials for the SME
DTS Solution - Building a SOC (Security Operations Center)
Building Security Operation Center
Threat Hunting with Splunk
GISS2016_Getting Started
5 Ways to Improve your Security Posture with Splunk Enterprise Security
SharePoint Search Secrets for Power Users & Administrators - Mike Smith
Splunk for Monitoring and Diagnostics in the Industrial Environment
Operationalizing Customer Centricity: A Prescription for Building Brand Loyal...
Marketo Customer Presentation
Operational Security Intelligence
Ad

Similar to Building an Analytics Enables SOC (20)

PPTX
SplunkLive! London 2017 - Splunk Overview
PDF
Splunk Solution overview testing versi 1
PDF
SplunkLive! Wien - Splunk für Security
PDF
SplunkLive! Zürich - Splunk für Security
PDF
SplunkLive! München 2016 - Splunk für Security
PDF
SplunkLive! Warsaw 2016 - Splunk for Security
PDF
Webinar: Neues zur Splunk App for Enterprise Security
PPTX
Splunk for IT Operations Breakout Session
PPTX
SplunkLive! London 2017 - Build a Security Portfolio That Strengthens Your Se...
PDF
Splunk for Industrial Data and the Internet of Things
PDF
Splunk - Splunk for Industrial Data and the Internet of Things
PPTX
SplunkLive! What's New in Splunk 6 Session
PPTX
SplunkLive! Milano 2016 - Splunk Plenary Session
PDF
March 2023 PNW User Group
PPTX
Splunk Overview
PDF
Splunk ES 8 mission controle data analytic
PDF
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
PDF
Power the SOC of the Future with scale, speed and choice - Splunk Public Sect...
PDF
2022 09 March Splunk PNW User Group
PDF
Virtual SplunkLive! for Higher Education Overview/Customers
SplunkLive! London 2017 - Splunk Overview
Splunk Solution overview testing versi 1
SplunkLive! Wien - Splunk für Security
SplunkLive! Zürich - Splunk für Security
SplunkLive! München 2016 - Splunk für Security
SplunkLive! Warsaw 2016 - Splunk for Security
Webinar: Neues zur Splunk App for Enterprise Security
Splunk for IT Operations Breakout Session
SplunkLive! London 2017 - Build a Security Portfolio That Strengthens Your Se...
Splunk for Industrial Data and the Internet of Things
Splunk - Splunk for Industrial Data and the Internet of Things
SplunkLive! What's New in Splunk 6 Session
SplunkLive! Milano 2016 - Splunk Plenary Session
March 2023 PNW User Group
Splunk Overview
Splunk ES 8 mission controle data analytic
Splunk Webinar: IT Operations Demo für Troubleshooting & Dashboarding
Power the SOC of the Future with scale, speed and choice - Splunk Public Sect...
2022 09 March Splunk PNW User Group
Virtual SplunkLive! for Higher Education Overview/Customers

More from Splunk (20)

PDF
Splunk Leadership Forum Wien - 20.05.2025
PDF
Splunk Security Update | Public Sector Summit Germany 2025
PDF
Building Resilience with Energy Management for the Public Sector
PDF
IT-Lagebild: Observability for Resilience (SVA)
PDF
Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)
PDF
Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)
PDF
Praktische Erfahrungen mit dem Attack Analyser (gematik)
PDF
Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)
PDF
Security - Mit Sicherheit zum Erfolg (Telekom)
PDF
One Cisco - Splunk Public Sector Summit Germany April 2025
PDF
.conf Go 2023 - Data analysis as a routine
PDF
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
PDF
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
PDF
.conf Go 2023 - Raiffeisen Bank International
PDF
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
PDF
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
PDF
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
PDF
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
PDF
.conf go 2023 - De NOC a CSIRT (Cellnex)
PDF
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
Splunk Leadership Forum Wien - 20.05.2025
Splunk Security Update | Public Sector Summit Germany 2025
Building Resilience with Energy Management for the Public Sector
IT-Lagebild: Observability for Resilience (SVA)
Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)
Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)
Praktische Erfahrungen mit dem Attack Analyser (gematik)
Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)
Security - Mit Sicherheit zum Erfolg (Telekom)
One Cisco - Splunk Public Sector Summit Germany April 2025
.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - De NOC a CSIRT (Cellnex)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)

Recently uploaded (20)

PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PPTX
Internet of Everything -Basic concepts details
PDF
Ensemble model-based arrhythmia classification with local interpretable model...
PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PDF
Examining Bias in AI Generated News Content.pdf
PDF
Altius execution marketplace concept.pdf
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PDF
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
PPTX
Module 1 Introduction to Web Programming .pptx
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PDF
EIS-Webinar-Regulated-Industries-2025-08.pdf
PDF
The AI Revolution in Customer Service - 2025
PDF
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
PDF
Electrocardiogram sequences data analytics and classification using unsupervi...
PPTX
Presentation - Principles of Instructional Design.pptx
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
4 layer Arch & Reference Arch of IoT.pdf
Advancing precision in air quality forecasting through machine learning integ...
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
Internet of Everything -Basic concepts details
Ensemble model-based arrhythmia classification with local interpretable model...
Lung cancer patients survival prediction using outlier detection and optimize...
Examining Bias in AI Generated News Content.pdf
Altius execution marketplace concept.pdf
Data Virtualization in Action: Scaling APIs and Apps with FME
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
Module 1 Introduction to Web Programming .pptx
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
EIS-Webinar-Regulated-Industries-2025-08.pdf
The AI Revolution in Customer Service - 2025
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
Electrocardiogram sequences data analytics and classification using unsupervi...
Presentation - Principles of Instructional Design.pptx

Building an Analytics Enables SOC