Splunk Tech Talks

Splunk Tech Talks
Deep-dives for technical practitioners.

Splunk Tech Talks

WhitneySink
Splunk Employee
Splunk Employee

Join Principal Threat Researcher, Michael Haag, as he walks through:

 

Read more...

more
0 1 898
WhitneySink
Splunk Employee
Splunk Employee

If you’re responsible for creating, maintaining or scaling your Splunk implementation, don’t miss this webinar on the refreshed and revised Splunk Success Framework (SSF).

 

Read more...

more
0 0 642
WhitneySink
Splunk Employee
Splunk Employee

This tech talk highlights how Splunk combined security and machine learning (ML) expertise to implement new detections in the Enterprise Security Content Update (ESCU) app.

Read more...

more
0 0 656
WhitneySink
Splunk Employee
Splunk Employee

This tech talk highlights content developed by the Splunk Threat Research Team in the past quarter, delivered in the form of detections that are grouped into analytic stories and delivered to Splunk customers through the Enterprise Security Content Update (ESCU) app.

Read more...

more
0 0 819
WhitneySink
Splunk Employee
Splunk Employee

Threat research shows that a large percentage of organizations experience DNS attacks. Often, adversaries dynamically generate domain names using Domain Generation Algorithms (DGA) to create C2 infrastructure not prone to static analysis disruption.

Read more...

more
2 3 2,399
WhitneySink
Splunk Employee
Splunk Employee

Ready to level up your skills with Ingest Actions?

Read more...

more
1 0 1,512
WhitneySink
Splunk Employee
Splunk Employee

Struggling with alert fatigue, lack of context, and prioritization around security incidents?

Read more...

more
0 0 1,052
LesediK
Splunk Employee
Splunk Employee

How to manage intelligence upstream to enhance phishing triage flows, enrich investigations, and improve priority scoring.

Read more...

more
0 1 1,017
WhitneySink
Splunk Employee
Splunk Employee

 How do you utilize the Splunk Cloud Migration Application? Our webinar will discuss these questions and provide some lessons learned from our Splunk Cloud Platform migration.

Read more...

more
1 2 1,872
melissap
Splunk Employee
Splunk Employee

How to use the analytical power of Splunk to hunt for cyber and insider threats, and also utilizes the Splunk Machine Learning Toolkit (MLKT) for novelty and outlier detection from the noisy security datasets.

Read more...

more
1 4 4,580
LesediK
Splunk Employee
Splunk Employee

The best of cloud practices and insights into your Enterprise deployment without the operational headache. Learn more.

Read more...

more
1 0 1,672
LesediK
Splunk Employee
Splunk Employee

Have you wondered what it takes to build a purple Team? Learn how.

Read more...

more
0 0 1,260
LesediK
Splunk Employee
Splunk Employee

Learn the basic concepts of apps and add-ons and how to get data in using Splunk REST APIs.

Read more...

more
1 0 1,537
Rumsha
Splunk Employee
Splunk Employee

How the Splunk Threat Research Team leverages the Splunk Attack Range

Read more...

more
0 1 2,118
LesediK
Splunk Employee
Splunk Employee

 How the admin console can save you time and give you more control 

Read more...

more
1 1 1,555
LesediK
Splunk Employee
Splunk Employee

This presentation will showcase a playbook pack

Read more...

more
0 0 1,109
WhitneySink
Splunk Employee
Splunk Employee

WATCH NOW

 

Learn how and why to migrate to Splunk 9.0

 

Read more...

more
3 1 4,870
LesediK
Splunk Employee
Splunk Employee

Watch Now | Tech Talk: Security Edition 

Read more...

more
0 1 2,199
LesediK
Splunk Employee
Splunk Employee

Watch Now | Tech Talk: Platform Edition 

Read more...

more
1 2 3,995
LesediK
Splunk Employee
Splunk Employee

Splunk Cloud Migration Assessment App

Read more...

more
0 1 2,193
LesediK
Splunk Employee
Splunk Employee

ACS is already enabled in your environment! It’s ready to use out of the box.

Read more...

more
0 1 2,038
WhitneySink
Splunk Employee
Splunk Employee

Improve Your Security Posture

Read more...

more
1 3 3,709
melissap
Splunk Employee
Splunk Employee

Tune in for Maximize the value from Microsoft Defender with Splunk to see how to prepare the data in Microsoft Defender and collect and normalize it into the Vulnerability data model. 

Read more...

more
2 2 3,935
LesediK
Splunk Employee
Splunk Employee

Zero Trust Architecture (ZTA) is becoming increasingly important in a cloud-first world where the perimeter no longer exists.

Read more...

more
0 1 2,603
LesediK
Splunk Employee
Splunk Employee

We will cover the most common Lateral Movement techniques affecting Microsoft environments and how to detect this behavior using Splunk.

Read more...

more
0 1 3,218
LesediK
Splunk Employee
Splunk Employee

Explore what is in the newest release of Splunk Enterprise Security.

Read more...

more
0 2 3,200
LesediK
Splunk Employee
Splunk Employee

Learn how to structure your data and configure Splunk to enable these analytic tools.

Read more...

more
0 1 3,158
LesediK
Splunk Employee
Splunk Employee

Splunk Intelligence Management for Splunk SOAR

Read more...

more
0 1 2,546
LesediK
Splunk Employee
Splunk Employee

Simplify Cloud Data Onboarding with the NEW Data Manager

Read more...

more
0 1 3,589
LesediK
Splunk Employee
Splunk Employee

Automation for the Modern SOC: Splunk SOAR’s New App Editor

Read more...

more
0 2 3,171
Splunk Go!

Don’t miss out on all the resources available for you to learn, get help and play with Splunk.

Upcoming Tech Talks

to attend and for updates on the next Tech Talks