Archived Events
During this week's virtual workshops, attendees received a hands-on opportunity to increase the level of Splunk skill sets across their organization.
Traditional approaches to information security are reactive and antiquated. In an era where technology is on-demand, we can no longer afford to be reactive, we must revolutionize all security practices while increasing our capabilities.Following on the heels of executive directives and combined ...
Blockchain is more than a transactional database of critical data. Once data is committed onto a blockchain, it is permanent and nearly impossible to manipulate or hack. As such, businesses can operate more efficiently and securely. Businesses are turning to blockchain to solve a wide range of problems ...
Participants joined us to learn more about how Splunk can help you better protect your organization against potential cyberattacks in response to the White House issued statement by President Biden and accompanying fact sheet.These were released warning companies to “accelerate our work to ...
Attendees joined us for an informative webinar where we discovered:Little-to-no infrastructure costs - reduce the physical burden of maintaining servers and infrastructure on sightHow Splunk experts manage Splunk Cloud, so your team can focus on doing higher-value businessScalable architecture ...
Most people in government would confirm that cybersecurity is their #1 priority right now. A hybrid work environment with its enlarged attack surface and a continuing escalation in the number and sophistication of attacks put the systems and the data that resides on them at an uncomfortable level of risk.The ...
Attendees joined us for a webinar where we went over:How to kick start IT operations visibility use cases by utilizing SplunkHow to maximize data re-use within your current Splunk instance/infrastructure Ease of adoption and out-of-the-box value with copy and paste "best ...
Zero trust is at the cornerstone of every agency’s cybersecurity plan. You didn't need the Cybersecurity Executive Order (EO 14028) to mandate it. Yet it raises many questions, despite reams of guidance from NIST, CISA, and OMB. With the recent release of OMB’s Zero Trust Strategy, agencies have a clearer roadmap on the ...
Attendees joined us for a two-day Splunk Security workshop series.Attendees learned basic to advanced comprehensive hands-on Splunk training to assist in future mission success.
The perimeter is what keeps attackers out of your systems, but with users, applications, and data moving outside of traditional boundaries the perimeter can no longer be tied to a single layer of security. In today’s working environment, where employees are connecting from anywhere at any time, controlling that access ...