Archived Events
The phrase “insider threat” often evokes not only headaches, but the mental image of a disgruntled coworker scheming on how best to bring an organization to a grinding halt. While this is absolutely an example of an insider threat, there is way more to an insider threat program than looking for web searches on “how to ...
Organizations face rapidly changing demands and increasingly agile procurements as the pace of technology innovation continues to accelerate. They encounter costly legacy software licensing and maintenance, drawn out procurement cycles that can inhibit innovation, and a lack of visibility into organizational software ...
Higher education institutions were forced to accelerate their digital journeys during the pandemic to better serve students, faculty, and staff. How can you ensure critical systems and applications, like the Student Information and Learning Management systems, remain operational and ready for what’s next? The answer: ...
Splunk helps defense agencies monitor and assess their systems for RMF compliance by automating the gathering, analysis, and reporting of system data relevant to RMF control families.Attendees joined us for a complimentary webinar where attendees learned specific ways Splunk helps embrace RMF such as:
The past 24 months have proven to be some of the most challenging for information security analysts, leaders, and stakeholders. We are battling workforce complications associated with the COVID-19 pandemic and seemingly never-ending cyber attacks. Coupled with an increase in supply chain issues, defending your organization ...
Attendees joined us for an informative webinar and learned:What happens when organizations don't have the right level of visibility into onboard operational technology networksWhy achieving observability into these networks is so difficultTechniques for gaining proper visibility and ...
Participants joined us for the continuation of our informative, hands-on virtual workshops where your IT teams had the opportunity to increase the level of Splunk skillsets across your organization.These workshop picked up where the last ones left off, watch those workshops ...
In August 2021, the Office of Management and Budget released a memo that outlined the requirements for section 8 of Executive Order 14028, Improving the Nation’s Cybersecurity. The memo outlines the requirements for each federal agency to collect, retain, and manage logs with a focus on centralized access and visibility for ...
The OT Security add-on for Splunk enables organizations that operate assets, networks, and facilities across both IT and OT environments to better apply the globally proven SIEM, Splunk Enterprise Security, to improve threat detection, incident investigation, and response.The OT Security add-on for Splunk expands the ...
Organizations spend billions annually on technology to ensure visibility, control, and security over servers, workstations, firewalls, and other IT assets. But data that powers the most costly, critical, and longest-lived defense assets goes largely uncaptured and unknown. Shouldn't you have at least the same observability ...