Who Should Attend: Splunk Administrators, Security Analysts, SOC Manager

Detect SolarWinds Cyberattack with Splunk Enterprise Security
Splunk Security Research teams have worked diligently to craft detections for our customers to use in their Splunk Cloud and Splunk Enterprise Security solutions. These detections will help you identify any threat actors attempting to replicate those tactics and techniques to compromise your data. Learn how to easily onboard these detections to gain the visibility needed to protect your organization against these emerging threats. We will also share a series of proactive tips to help bolster your organization’s security posture to mitigate similar threats in the future.

This Tech Talk will allow you to:

  • Onboard and search for Threat Indicators in your Splunk environment to start detecting SolarWinds related malware
  • Start detecting Sunburst malware activity using Splunk by reviewing and updating your log types ingested into Splunk, then examine DNS, network, and host traffic logs
  • Start detecting Supernova webshell malware by examining results of vulnerability scans, hashes and proxy logs

Speakers:

Macy Cronkite

Principal Security Tech Lead

Jairo Camacho

Product Marketing Specialist, Splunk





Tracking Fields

DO NOT EDIT

Event Fields

DO NOT EDIT
DO NOT EDIT
I agree to the Splunk Websites Terms and Conditions of Use.*
I agree to receive marketing communications by email, including educational materials, product and company announcements, and community event information, from Splunk Inc. and its Subsidiaries pursuant to the terms of Splunk’s Privacy Policy. I can unsubscribe at any time.