Splunk Tech Talks
Deep-dives for technical practitioners.

Operationalizing TDIR: Building a More Resilient, Scalable SOC

DayaSCanales
Splunk Employee
Splunk Employee

Screenshot 2025-08-15 at 4.04.52 PM.png

Optimizing SOC workflows with a unified, risk-based approach to Threat Detection, Investigation, and Response (TDIR).

 

Key Takeaways:

  • Automation: Reduce manual effort and alert fatigue through operationalized automation.
  • Context-Driven Insights: Gain visibility across hybrid environments for more effective investigations.
  • Data-Enriched Prioritization: Use asset, identity, and threat intelligence to focus on high-priority incidents.
  • Modernizing Workflows: Improve legacy SOC processes without replacing existing tools.

This session offered actionable steps to enhance SOC efficiency, empower analysts, and stay ahead of evolving threats.


LesediK
Splunk Employee
Splunk Employee

Here are a few more resources you may find interesting, enjoy!

The SecOps Handbook to TDIR: Discover how to pare down systems and integrate tools across your enterprise environment.

Blog Posts

Lantern: Automate complete TDIR life cycle

DayaSCanales
Splunk Employee
Splunk Employee

Here are a few top of mind questions from the live Tech Talk

 

Q. What approach would you take to entice a client who is still resistant to switching to a risk framework?

A. The approach would highlight how risk-based alerting saves analysts' time by grouping different basic alerts into risk-based findings, allowing them to focus on critical alerts and deep-dive into more important investigations instead of reviewing hundreds of basic alerts daily.

DayaSCanales_0-1756406100251.png

Q. Can the AI assistant be leveraged to lower false positives, and if so, how?

A. Yes, the AI assistant can help identify different types of false positives by analyzing trends within alerts generated by detections, with the right prompts.

DayaSCanales_1-1756406100250.png

Q. For intelligence, does Splunk use Cisco Talos?

A. Yes, whenever a client gets a Splunk Enterprise Security license, they receive Cisco Talos integration for free, allowing them to use enrichment information from Cisco within Splunk Enterprise Security.

DayaSCanales_2-1756406100253.png

Q. Can Splunk use most threat intelligence feeds?

A. Yes, even though Cisco Talos integration is included for free, Splunk can integrate with many other threat intelligence feeds, such as Virus-Total and IBM X-Force Exchange.

DayaSCanales_2-1756406100253.png

Q. Is Cisco Talos the only intelligence platform they use or are there others too, like Crowd-strike intelligence?

A. No, while Cisco Talos integration is included out-of-the-box and for free with a Splunk Enterprise Security license, Splunk can integrate with many other security intelligence feeds. Examples include Virus-Total and IBM X-Force Intel.

DayaSCanales_2-1756406100253.png

Q. What are some of the primary connectors in SOAR that are most impressive for a SOC to use?

A. The most impressive connectors in SOAR depend on the specific use case and organizational needs. However, key examples highlighted include the Cisco Talos connector for automatic enrichment of investigations and findings, Virus-Total for threat intelligence, and connectors for ticketing systems like ServiceNow or Jira, which can automate tasks such as opening new tickets for investigations.

DayaSCanales_3-1756406100254.png

Q. Does EDR (Endpoint Detection and Response) telemetry ingestion in Splunk provide benefits, considering it can consume a lot of ingestion volume?

A. Yes, EDR telemetry is highly beneficial for creating meaningful detections. While it can consume a significant amount of ingestion, data models can help manage this volume.

DayaSCanales_4-1756406100255.png

Q. Is the AI assistant a free add on?

A. Yes, the AI assistant is a free add-on.

DayaSCanales_5-1756406100255.png

Q. How does Splunk handle Protected Health Information (PHI) when using the AI assistant?

A. Any data within the Splunk environment, including PHI, stays within Splunk, and interactions with the AI assistant are private to the user.

DayaSCanales_6-1756406100256.png

Q. Is it possible to pull KPI metrics on the Splunk platform?

A. Yes, Splunk comes with over 100 dashboards out-of-the-box that can be used or customized to track KPIs. These dashboards provide views on security posture, findings over time, urgency, and executive summaries, including metrics like mean time to triage and mean time to resolution.

DayaSCanales_7-1756406100256.png

Q. Does this prioritize the response list based on the type of incident, to help guide the analyst towards what response is most appropriate?

A. Yes, Splunk uses "response plans" which are designed to guide analysts on what to do for specific alerts coming from particular detections. This means that analysts will not treat every detection or alert the same way, as the response plans help tailor the actions to the incident type.

DayaSCanales_7-1756406100256.png

Q. Here you have some of the links shared on the presentation:

A. The SecOps Handbook to TDIR
Automate complete TDIR life cycle
Innovations in Splunk Security Expands Unified TDIR Experience to On-Premises and FedRamp Moderate E...
The TDIR Lifecycle: Threat Detection, Investigation, Response

DayaSCanales_14-1756406100260.png

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...