Archived Events
The past 24 months have proven to be some of the most challenging for information security analysts, leaders, and stakeholders. We are battling workforce complications associated with the COVID-19 pandemic and seemingly never-ending cyber attacks. Coupled with an increase in supply chain issues, defending your organization ...
Attendees joined us for an informative webinar and learned:What happens when organizations don't have the right level of visibility into onboard operational technology networksWhy achieving observability into these networks is so difficultTechniques for gaining proper visibility and ...
Participants joined us for the continuation of our informative, hands-on virtual workshops where your IT teams had the opportunity to increase the level of Splunk skillsets across your organization.These workshop picked up where the last ones left off, watch those workshops ...
In August 2021, the Office of Management and Budget released a memo that outlined the requirements for section 8 of Executive Order 14028, Improving the Nation’s Cybersecurity. The memo outlines the requirements for each federal agency to collect, retain, and manage logs with a focus on centralized access and visibility for ...
The OT Security add-on for Splunk enables organizations that operate assets, networks, and facilities across both IT and OT environments to better apply the globally proven SIEM, Splunk Enterprise Security, to improve threat detection, incident investigation, and response.The OT Security add-on for Splunk expands the ...
Organizations spend billions annually on technology to ensure visibility, control, and security over servers, workstations, firewalls, and other IT assets. But data that powers the most costly, critical, and longest-lived defense assets goes largely uncaptured and unknown. Shouldn't you have at least the same observability ...
During this week's virtual workshops, attendees received a hands-on opportunity to increase the level of Splunk skill sets across their organization.
Traditional approaches to information security are reactive and antiquated. In an era where technology is on-demand, we can no longer afford to be reactive, we must revolutionize all security practices while increasing our capabilities.Following on the heels of executive directives and combined ...
Blockchain is more than a transactional database of critical data. Once data is committed onto a blockchain, it is permanent and nearly impossible to manipulate or hack. As such, businesses can operate more efficiently and securely. Businesses are turning to blockchain to solve a wide range of problems ...
Participants joined us to learn more about how Splunk can help you better protect your organization against potential cyberattacks in response to the White House issued statement by President Biden and accompanying fact sheet.These were released warning companies to “accelerate our work to ...