Watch Now

Who Should Attend: Splunk Administrators, Security Analysts, SOC Manager

Historically, Security Operations Centers have been noisy places. Teams have worked endlessly to craft the ‘perfect’ correlation search, to no avail. As the volume of security alerts continued to grow, it has put a disproportionate amount of the workload on analysts, as their primary job function became triage related activities. Tune in to learn how Enterprise Security with native Risk-Based Alerting functionality addresses this issue. In a series of clicks, ES users can map against their preferred cybersecurity framework (e.g. MITRE ATT&CK), start aligning analytics to quantify their cybersecurity coverage, and watch the number of alerts plummet.

Learn how to:

  • Improve true positive rates
  • Detect complex threats faster
  • Streamline investigations with richer context

Speakers:

Jim Apger

Staff Security Strategist, Splunk

Jairo Camacho

Security Product Marketing Specialist, Splunk





Tracking Fields

DO NOT EDIT

Event Fields

DO NOT EDIT
DO NOT EDIT
I agree to the Splunk Websites Terms and Conditions of Use.*
I agree to receive marketing communications by email, including educational materials, product and company announcements, and community event information, from Splunk Inc. and its Subsidiaries pursuant to the terms of Splunk’s Privacy Policy. I can unsubscribe at any time.