View our Tech Talk: Security Edition, Test Your SIEM with Splunk’s Attack Data Repository.
Splunk Enterprise Security contains the repository of correlation searches for your organization. When a potential threat is spotted, your SIEM leverages these correlation searches to mobilize the necessary resources to investigate and remediate threats. As threat actors’ techniques continue to adapt and evolve, your searches must do the same.
Tune in to this Tech Talk to learn how your organization can use attack datasets to evaluate the strengths and weaknesses of your SIEM correlation searches. Attack datasets consist of real datasets with real attacks generated by the attack_range. These datasets are broken down by techniques and tactics according to the MITRE ATT&CK matrix.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.