Who Should Attend: Splunk Administrators, Security Analysts, SOC Manager

Intelligence Management with Splunk + TruSTAR
Manual vetting and data from multiple sources cause analysts to waste much of their time data wrangling, taking time away from alerts that matter the most. Analysts need the ability to normalize and enrich multiple data sources for an objective view of security events.

The TruSTAR Unified App for Splunk Enterprise and Enterprise Security helps security professionals analyze notable events and leverage intelligence to quickly understand threat context and prioritize and accelerate triage.

Tune in to learn how to:

  • Customize data ingest preferences using TruSTAR Indicator Prioritization Intel Workflows
  • Automatically download observables into Splunk KV stores
  • Enrich and prioritize notable events in Splunk Enterprise Security

Speakers:

Steve Chamales

Product Manager, Threat Intel

Casey Wopat

Product Marketing Manager


DO NOT EDIT