June 5, 2019
Tim Tully has served as our Senior Vice President, Chief Technology Officer since 2018. Prior to this role, Mr. Tully served as our Chief Technology Officer in 2017. Prior to joining us, Mr. Tully served in various roles at Yahoo! Inc., a digital information discovery company, from 2003 to 2017, including most recently as Vice President, Engineering from 2014 to 2017 and before that in engineering leadership roles including Distinguished Engineer and Chief Data Architect. Mr. Tully began his career as a Member of Technical Staff at Sun Microsystems on the JavaSoft team, and also spent time at several startup companies. Mr. Tully holds an M.S. from Carnegie Mellon University and a B.S. from the University of California, Davis.
Marcus K. Rogers, Ph.D., CISSP, CCCI, DFCP, is the Executive Director for Cybersecurity Programs in the Purdue Polytechnic Institute at Purdue University, a former police officer and the editor in chief of the Journal of Digital Forensics Security and Law. He is a Professor, Fellow of the Center for Education and Research in Information Assurance and Security (CERIAS), Fellow of the American Academy of Forensic Sciences (AAFS) and is a Member of the Board of the American Academy of Forensic Sciences (AAFS). As a police officer he worked in the area of fraud and computer crime investigations. Dr. Rogers sits on the editorial board for several professional journals both domestic and international. He is also a member of various national and international standards committees focusing on cyber security, digital forensics science and digital evidence. Dr. Rogers is the author of books, book chapters, and journal publications in the field of cyber security, digital forensics and applied psychological analysis. His research interests include applied cyber-forensics, incident response, psychological digital crime scene analysis, cybercrime scene analysis, and cyber-terrorism. He is a frequent speaker at international and national information assurance and security conferences, and guest lectures throughout the world.
Ilker Ozkaymak (IO) (Human, father, husband, son, brother, uncle, friend, coworker, mentor...)
MBA in IT Management, CISM, CISSP, GSLC.
IO is a results-driven, supporting, and empowering leader with over 20 years of proven IT and Security experience in diverse industries from finance to telecommunication. He enjoys turning complicated and challenging problems into fun, simple, yet effective solutions. He uses his knowledge, experience, and personal skills to help organizations to achieve their goals. He brings his passion and determination to help those around him to reach their full potential.
https://ridingintraffic.github.io/
https://medium.com/@michael.j.fettis
Cars.com as Site Reliability Engineer / Dev Ops engineer.
Uptake as Core Systems Engineer
Allstate Security as Siem Content Engineer and Cloud Security Engineer
I have done Devops / SRE and then an infrastructure/systems engineer. Configuration and infrastructure as code, literally “everything” as code.
I enjoy living in a terminal, ssh sessions, and VIM.
I have various text files saved as iterations of “Splunk grimoire” and other books of magic. If I have to do something more than twice I will generally write a script for it or as a function in my dot files. I will then version control and check in my dot files and I have scripts around those to identify what system I am working on and load in the proper configurations.
I vehemently believe that the way that we do work and the tools that we use must be honed and sharpened to the best of their ability.
The best tools are kept oiled and sharpened.
I also do this for fun.
Time | Description | |||
---|---|---|---|---|
8:00am | Registration and Breakfast | |||
9:00am | General Session Tim Tully, SVP and CTO, Splunk Inc. |
|||
Overview Track | IT Ops Track | Security Track | Industry Track | |
11:00am | Turning Data into Business Outcomes with Splunk Platform | Predictive, Proactive and Collaborative ML with IT Service Intelligence | Intro to Security Analytics Methods | Splunk for Financial Crime and Fraud Detection |
12:00pm | Lunch — PartnerZone | |||
1:15pm | Get More from your Data with Splunk AI+ML | Adventures in Monitoring and Troubleshooting | Use Splunk Incident Response, Orchestration and Automation | Ensuring Patient Privacy and Regulatory Compliance with Splunk |
2:45pm | What’s New with the Latest Splunk Platform Release | Happy Applications, Happy Users: Using Splunk for Application Performance | Legacy SIEM to Splunk, How to Conquer Migration and Not Die Trying | Customer Insights: Splunk for Financial Services |
3:45pm | Reception — PartnerZone |
This presentation + demo introduces the differentiated value of the Splunk platform, and describes how Splunk helps customers navigate the digital evolution. This presentation includes an introduction to Splunk Next, a collection of new technologies designed to enable expansive data access, empowering more users to deliver actionable outcomes.
Reduce breaches, set up monitoring, and build more predictive capabilities with the power of Splunk’s search processing language (SPL), via the Splunk Security Essentials App. Learn how to tighten security with actionable searches that you can use immediately. See examples with demo data, and also learn how to apply custom data in your own environment.
This session demonstrates how anyone can combine IT Service Intelligence, the Machine Learning Toolkit, and Victor Ops to help them shift from Reactive to Predictive IT to get ahead of outages and resolve issues faster.
It comes as no surprise that financial organizations are making fraud detection and prevention a top priority. Fraud can have a significant impact to business both financially and operationally. Financial organizations must have the ability to perform advanced data analytics in order to recognize and respond to patterns of fraud. This session will showcase how Splunk software can be deployed for anti-fraud use cases and how Splunk enables these organizations to index, correlate and analyze all fraud-related machine data across their entire IT infrastructure, including data from specific point fraud solutions.
Want to know what exactly Splunk means when we say we offer Artificial Intelligence and Machine Learning? Splunk will communicate the meaning of Artificial Intelligence and Machine Learning terminology we use, and how this forward looking technology is integrated across the Splunk portfolio— as a customizable solution within the Splunk platform through the Machine Learning Toolkit AND embedded in our Premium Solutions.
Learn how the Phantom Security Orchestration, Automation, and Response (SOAR) Platform can help you and your team close your skills gap, respond to threats faster, and drive higher operational efficiency.
Historically, IT has been burdened with siloed tools that lack observability and predictability, leading to the common pain point of "swivel hips" for SREs and administrators. Learn how Splunk offers a unified monitoring experience for all your teams by providing a modern, scalable solution to prevent and solve problems faster and increase productivity.
Healthcare providers must ensure and enforce the security and protection of PHI. As such, there are penalties and fines for inappropriate patient data exposure. Being HIPAA compliant and keeping patient data private is a primary objective for healthcare providers and their business associates. This session will showcase how healthcare organizations use Splunk software to ensure the privacy of PHI and achieve regulatory compliance.
This presentation + demo provides an overview of Splunk Cloud and Splunk Enterprise version 7.2, and Splunk Machine Learning Toolkit 4.0 – the customer value proposition, supporting customer stories, and high-level technical details.
Traditional SIEMs are complex, opaque platforms, which have frequently under delivered, have regularly lead to either failed investments or technical frustrations. Failure to understand the limitations and pitfalls of legacy SIEMs can be dire for an organization leading to suffering a breach or failing compliance audit. Attend this session and learn the best practices on how to migrate your SIEM Solution to Splunk.
Good app performance is something many people care about, from business owners back to operations, app managers, and developers. Poor app performance affects revenue and reputation. Knowing where the source of the problem is requires a platform approach. Hear and see how the Splunk platform is at the center of a complete APM approach.
Moreso than many other industries, the real time ability to correlate across huge volumes and varieties of data to take immediate action is critical in the Financial Services sector. If you’re a financial services organization, you can bank on it—Splunk offers a variety of use cases to help you better deliver on know your customer initiatives, bring products and services to market faster, better secure your organization, gain better insights into KPIs and so much more. Invest some time in this session to dive into several use cases and customer successes and specifically review trading operations and ATM operations demos.
Corelight is the most powerful network visibility solution for information security professionals and helps them understand their network traffic to detect and stop cyber attacks. Our solution is built on Bro, the powerful and widely-used open source framework that provides real-time understanding of all the traffic on your network. Our appliance provides the right type and volume of information organized to help you understand network traffic deeply and take action to stop and prevent cyber attacks. The Corelight Sensor provides the right type of information organized in a way that illuminates the traffic on your network to help you understand it.www.corelight.com
DomainTools helps security analysts turn threat data into threat intelligence. We take indicators from your network, including domains and IPs, and connect them with nearly every active domain on the Internet. Those connections inform risk assessments, help profile attackers, guide online fraud investigations, and map cyber activity to attacker infrastructure. Fortune 1000 companies, global government agencies, and leading security solution vendors use the DomainTools platform as a critical ingredient in their threat investigation and mitigation work. Learn more about how to connect the dots on malicious activity at http://www.domaintools.com or follow us on Twitter:@domaintoolshttp://www.domaintools.com
Puppet is driving the movement to a world of unconstrained software change. Its industry-standard platform automates the delivery and operation of the software that powers everything around us. More than 40,000 companies — including more than 75 percent of the Fortune 100 — use Puppet’s open source and commercial solutions to gain situational awareness and drive software change with confidence. Based in Portland, Oregon, Puppet employs more than 500 people around the world. Learn more at puppet.com.
Established in 2011 and based in San Francisco, SwiftStack innovations power multi-cloud storage for enterprises. It starts with universal access to petabytes of unstructured data in a single namespace on premises and continues with freedom to move workloads among private data centers and public clouds like Amazon or Google. With pay-as-you-grow licensing and freedom to choose preferred hardware or cloud providers, mission data remains under the control of internal IT teams. Public sector customers use SwiftStack software as the platform for their data-centric workflows including content delivery, active archive, collaboration, research, and more www.swiftstack.com
Tenable®, Inc. is the Cyber Exposure company. Over 27,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, more than 25 percent of the Global 2000 and large government agencies. Learn more at www.tenable.com.
Pure Storage (NYSE: PSTG) helps innovators build a better world with data. Pure's data solutions enable SaaS companies, cloud service providers, and enterprise and public sector customers to deliver real-time, secure data to power their mission-critical production, DevOps, and modern analytics environments in a multi-cloud environment. One of the fastest growing enterprise IT companies in history, Pure Storage enables customers to quickly adopt next-generation technologies, including artificial intelligence and machine learning, to help maximize the value of their data for competitive advantage. And with a certified NPS customer satisfaction score in the top one percent of B2B companies, Pure's ever-expanding list of customers are among the happiest in the world.
CDW is a leading multi-brand technology solutions provider to business, government, education and healthcare organizations in the United States, the United Kingdom and Canada. A Fortune 500 company with multi-national capabilities, CDW was founded in 1984 and employs more than 9,400 coworkers. For the trailing twelve months ended March 31, 2019, the company generated net sales over $16 billion. For more information about CDW, please visit
www.CDW.com
IBM is a cognitive solutions and cloud platform company headquartered in Armonk, NY. It is the largest technology and consulting employer in the world, serving clients in more than 170 countries. With 25 consecutive years of patent leadership, IBM Research is the world's largest corporate research organization with more than 3,000 researchers in 12 labs located across six continents. For more information, visit
www.ibm.com
.
Proficio is an award-winning managed security services provider (MSSP) delivering 24/7 security monitoring and managed detection and response (MDR) services.
Proficio has Security Operations Centers (SOCs) in San Diego, Singapore, and Barcelona where our security teams monitor security events, investigate suspicious behavior, and hunt for APTs.)
Our services include:
Recorded Future delivers the only complete threat intelligence solution powered by patented machine learning to lower risk. We empower organizations to reveal unknown threats before they impact business, and enable teams to respond to alerts 10 times faster. To supercharge the efforts of security teams, our technology automatically collects and analyzes intelligence from technical, open, and dark web sources and incorporates intelligence research. Recorded Future delivers more context than threat feeds, updates in real time so intelligence stays relevant, and centralizes information ready for human analysis and integration with security technologies. Security team productivity improves by 32% with Recorded Future.
RHONDOS is the exclusive distributor of PowerConnect for the North American market, providing first-line Support and Implementation Services that facilitate maximum return on investment when ingesting SAP security logs, performance metrics, and business data into Splunk. We consider ourselves a Talent Agency for Splunking SAP, hiring and investing in some of the brightest minds for Splunk and SAP: senior consultants and support personnel who are recognized experts in architecting, deploying, configuring, and customizing Splunk Enterprise, Splunk ES & ITSI, and optimizing them to receive mission-critical SAP data. The founders of RHONDOS are industry veterans with experience working at companies including Splunk, Microsoft, and SAP.