Skip to main content
false
David Dalling
David Dalling

David is a subject matter expert with over 20 years of Information Security experience and IT Operations. He is an accomplished, motivated, and versatile IT professional in a variety of Information Technology fields ranging from hands-on systems development, testing, and management to enterprise-level strategic planning, and consultation. David is a man of firsts; He helped get the DHS Enterprise Security Operations program its first ever ATO, wrote the first ever common control package for DHS, received a security engineering award at DHS HQ for developing a metrics program that contributed to DHS first ever perfect score card. Taking this experience David then lead the development of the first ever Managed XDR service to receive its FedRAMP Authorization. David has now taken his love to take on new challenges to Adventure racing were he purposely gets lost in the woods to compete with Trail running, Mountain biking and kayaking for 100s miles. As the Global VP for Splunk’s Cyber Strategist team, David helps drive the security strategy for Splunk and its security products.

Security 5 Min Read

Add To Chrome? - Part 4: Threat Hunting in 3-Dimensions: M-ATH in the Chrome Web Store

SURGe experiments with a method to find masquerading using M-ATH with Splunk and the DSDL App.
Security 4 Min Read

Detect Money Laundering, Healthcare Fraud, and Unemployment Fraud with the New Version of the Splunk App for Fraud Analytics

Detect money laundering, healthcare fraud, and unemployment fraud with Splunk App Fraud Analytics 1.2.4.
Security 3 Min Read

Staff Picks for Splunk Security Reading February 2024

The Splunk security team shares a curated list of presentations, whitepapers, and customer case studies they feel are worth a read.
IT 3 Min Read

Top 5 Outcomes CIOs Need to Accomplish by 2025: Driving Business Value Through Technology

Splunker Todd DeCapua shares five key outcomes CIOs should focus on when it comes to their technology investments.
Security 7 Min Read

Beyond Logs: Navigating Entity Behavior in Splunk Platform

Master internal threat detection with Splunk's anomaly detection, finding events like unusual geolocations and spikes in activity, while optimizing security.
Security 11 Min Read

Unveiling Phemedrone Stealer: Threat Analysis and Detections

The Splunk Threat Research Team dissects the Phemedrone Stealer.
Security 5 Min Read

Add to Chrome? - Part 3: Findings and Recommendations

SURGe explores findings and general recommendations on whether or not you should click 'Add to Chrome' the next time you find a fancy new extension.
Security 5 Min Read

Add to Chrome? - Part 2: How We Did Our Research

SURGe explores the analysis pipeline in more detail and digs into the two main phases of this research – how the team collected the data and how they analyzed it.
Learn 4 Min Read

Google Cloud Next 2024: Complete Guide

This blog post will cover the complete details around Google Cloud Next 2024, the upcoming conference in Las Vegas.