Skip to main content
false
David Dalling
David Dalling

David is a subject matter expert with over 20 years of Information Security experience and IT Operations. He is an accomplished, motivated, and versatile IT professional in a variety of Information Technology fields ranging from hands-on systems development, testing, and management to enterprise-level strategic planning, and consultation. David is a man of firsts; He helped get the DHS Enterprise Security Operations program its first ever ATO, wrote the first ever common control package for DHS, received a security engineering award at DHS HQ for developing a metrics program that contributed to DHS first ever perfect score card. Taking this experience David then lead the development of the first ever Managed XDR service to receive its FedRAMP Authorization. David has now taken his love to take on new challenges to Adventure racing were he purposely gets lost in the woods to compete with Trail running, Mountain biking and kayaking for 100s miles. As the Global VP for Splunk’s Cyber Strategist team, David helps drive the security strategy for Splunk and its security products.

Learn 11 Min Read

Continuous Compliance: Today’s Ultimate Guide

Companies must comply with a variety of industry and government standards and laws. Continuous compliance is the best way to ensure you’re ready and prepared.
Learn 7 Min Read

The Best Security Conferences & Events 2024

Ready for in-person security conferences and events? Check out this roundup of 2024 security conferences, covering cybersecurity, InfoSec, SecOps and more.
DevOps 1 Min Read

How Splunk Observability Cloud Helps To Alleviate Developer Burnout

Splunk Observability Cloud has built-in capabilities to help improve developer experience and productivity.
DevOps 5 Min Read

How to Simplify Your Incident Response Workflow with Splunk On-Call

Splunker Jennifer Elkhouri explains how Splunk On-Call relieves on-call stress: clear alerting practices and defined workflows mitigate developer team burdens.
Security 17 Min Read

Hunting M365 Invaders: Dissecting Email Collection Techniques

The Splunk Threat Research Team describes various methods attackers may leverage to monitor mailboxes, how to simulate them and how teams can detect them using Splunk’s out-of-the-box security content.
Learn 9 Min Read

Blockchain & Crypto Conferences 2024: The Complete Guide

Whether you are looking for a small regional meetup or an enormous global summit, we’ve compiled the complete 2024 guide to Blockchain & crypto conferences that is sure to have the right event for you!
DevOps 3 Min Read

Data Storage Costs Keeping You Up at Night? Meet Archived Metrics

Splunkers Joanna Zouhour and Navtej Singh introduce Splunk's Archived Metrics, storing data affordably, enhancing accessibility, and reducing costs in Metrics Pipeline Management.
Security 8 Min Read

Elevating Security: The Growing Importance of Open Cybersecurity Schema Framework (OCSF)

Splunker Paul Agbabian shares what's new in the Open Cybersecurity Schema Framework (OCSF) and how profiles can augment the natural structure of event classes and categories.
DevOps 6 Min Read

Begin Your Trip to Observability by Packing Your Baggage With Context

OpenTelemetry context with baggage can help you quickly find value, errors and maybe your luggage.