Who Should Attend: Splunk Administrators, Security Analysts, SOC Manager
Detect SolarWinds Cyberattack with Splunk Enterprise Security
Splunk Security Research teams have worked diligently to craft detections for our customers to use in their Splunk Cloud and Splunk Enterprise Security solutions. These detections will help you identify any threat actors attempting to replicate those tactics and techniques to compromise your data. Learn how to easily onboard these detections to gain the visibility needed to protect your organization against these emerging threats. We will also share a series of proactive tips to help bolster your organization’s security posture to mitigate similar threats in the future.
This Tech Talk will allow you to:
-
Onboard and search for Threat Indicators in your Splunk environment to start detecting SolarWinds related malware
-
Start detecting Sunburst malware activity using Splunk by reviewing and updating your log types ingested into Splunk, then examine DNS, network, and host traffic logs
-
Start detecting Supernova webshell malware by examining results of vulnerability scans, hashes and proxy logs
Speakers:
Macy Cronkite
Principal Security Tech Lead
Principal Security Tech Lead
As a Splunk Professional Services Consultant / Architect, Macy supports enabling big data analysis as a capability of enterprise IT & SOC operations through the development and implementation of enterprise sensor networks, by providing high-quality analysis from captured machine data in logs. You can find Macy on LinkedIn here.
You can find Macy on
LinkedIn.
Jairo Camacho
Product Marketing Specialist, Splunk
Product Marketing Specialist, Splunk
Jairo is a Product Marketer in the Security Markets Group at Splunk. He focuses on the Splunk User and Entity Behavior Analytics segment of the security market.
You can find Jairo on
LinkedIn.