Watch Now

Who Should Attend: Splunk Administrators, Security Analysts, SOC Manager

Splunk Enterprise Security contains the repository of correlation searches for your organization. When a potential threat is spotted, your SIEM leverages these correlation searches to mobilize the necessary resources to investigate and remediate threats. As threat actors’ techniques continue to adapt and evolve, your searches must do the same.

Tune in to this Tech Talk to learn how your organization can use attack datasets to evaluate the strengths and weaknesses of your SIEM correlation searches. Attack datasets consist of real datasets with real attacks generated by the attack_range. These datasets are broken down by techniques and tactics according to the MITRE ATT&CK matrix.

Speakers:

Patrick Bareiss

Senior Threat Research Engineer, Splunk

Jairo Camacho

Product Marketing Specialist, Splunk





Tracking Fields

DO NOT EDIT

Event Fields

DO NOT EDIT
DO NOT EDIT
I agree to the Splunk Websites Terms and Conditions of Use.*
I agree to receive marketing communications by email, including educational materials, product and company announcements, and community event information, from Splunk Inc. and its Subsidiaries pursuant to the terms of Splunk’s Privacy Policy. I can unsubscribe at any time.