Skip to main content
false
David Dalling
David Dalling

David is a subject matter expert with over 20 years of Information Security experience and IT Operations. He is an accomplished, motivated, and versatile IT professional in a variety of Information Technology fields ranging from hands-on systems development, testing, and management to enterprise-level strategic planning, and consultation. David is a man of firsts; He helped get the DHS Enterprise Security Operations program its first ever ATO, wrote the first ever common control package for DHS, received a security engineering award at DHS HQ for developing a metrics program that contributed to DHS first ever perfect score card. Taking this experience David then lead the development of the first ever Managed XDR service to receive its FedRAMP Authorization. David has now taken his love to take on new challenges to Adventure racing were he purposely gets lost in the woods to compete with Trail running, Mountain biking and kayaking for 100s miles. As the Global VP for Splunk’s Cyber Strategist team, David helps drive the security strategy for Splunk and its security products.

Learn 4 Min Read

Secure AI System Development

CISA & NCSC have issued joint guidelines for developing secure AI systems. Let's understand these guidelines, so we can mitigate risk in AI development.
Learn 3 Min Read

Multimodal AI Explained

Multimodal AI is the “next big thing” in artificial intelligence technology. What does multimodal mean, and how does it compare to AIs we've already got?
Industries 5 Min Read

Using Amazon SageMaker to Predict Risk Scores from Splunk

Splunker Nimish Doshi covers using Amazon SageMaker and Splunk to further develop a fraud detection use case to predict future risk scores.
Learn 5 Min Read

Data Breach Defined & Ways To Prevent One in 2024

Data breaches can happen in many ways — ransomware, phishing, accidental exposure — but one thing is clear: our data is being breached all the time.
Learn 5 Min Read

Availability Management: An Introduction

Understand application availability, why traditional availability monitoring fails, and best practices for end-to-end monitoring for today’s availability.
DevOps 2 Min Read

How to Monitor Your Hybrid Applications Without Toil

Splunk can help you conquer the complexity of your hybrid environment.
Splunk Life 2 Min Read

December 2023 Living Our Values Award Winners

Cheers to the Splunkers who embody our core values of innovative, passionate, disruptive, open and fun.
Security 7 Min Read

Ghost in the Web Shell: Introducing ShellSweep

Splunk introduces ShellSweep, a suite of utilities designed to detect and combat malicious web shells in servers.
Learn 4 Min Read

Endpoints and Endpoint Detection: Importance & Risk Mapping

Endpoints sound like an afterthought...not like the most important part of your cybersecurity posture. Learn what endpoints are, and why detecting them is so important.