Splunk is committed to using inclusive and unbiased language. This blog post might contain terminology that we no longer use. For more information on our updated terminology and our stance on biased language, please visit our blog post. We appreciate your understanding as we work towards making our community more inclusive for everyone.
So you’ve heard that Boss of the SOC (BOTS) is the place to be on Monday nights at Splunk .conf. Version 7 of BOTS is coming at you on Monday June 13th at 6pm PDT — form your team and sign up now!
BOTS is a blue-team, jeopardy-style, capture-the-flag-esque (CTF) activity where participants leverage Splunk's Security Suite to answer a variety of questions about the type of real-world incidents that security analysts face regularly. We developed BOTS because we were tired of showing up at security conferences and finding the CTFs to be entirely red-team oriented. There are other blue team CTFs out there — especially the grandfather to them all, SANS NetWars — but few of them attempt to recreate the life of a security analyst facing an adversary at all stages of an attack
For BOTS, we work very hard to ask questions that not only require competitors to understand Splunk but also know how to research open-source intelligence (OSINT) and think outside of the “Splunk box." Are you excited yet?
You’ll again play the part of Alice Bluebird, our quirky Splunk Security analyst who has had a rough go since joining Frothly Home Brewery six years ago. On the heels of last summer’s attack, Alice decided to take some much deserved vacation and enjoy time on a nice tropical island. Besides, Violent Memmes only attacks in August, why would they ever change?
With Alice enjoying an umbrella drink on a beach somewhere, Grace moved ahead with the acquisition of Toads Pest Controls. During conversations, Toads decided to decommission several tools and integrate their Splunk instance with Frothly’s to collect all of their data in one location. Meanwhile, Violent Memmes decides to attack Toads Pest Control during their Splunk Infrastructure Migration.
Yes! We've written about who should play before, but it's worth repeating here. If you've gotten this far, you are almost certainly an excellent fit for BOTS.
To hold your own in BOTS, we usually tell folks they need to know a little about Splunk security solutions and a little about security. However, all you really need is the desire to learn something new and have fun.
The questions in BOTS range from easy to hard and everything in between. Every question comes with hints to nudge you in the right direction. If you need more help, coaches are onsite and online to assist when the hints run out. Also — don't forget — BOTS is a team sport, so if you bring your crew, you won't be alone.
If all of that isn't enough to convince you that BOTS is a safe, supportive, and fun learning environment, we've now made it super easy to play anonymously if you choose. Are you feeling a little judged on that big scoreboard? No problem. Just flip the bit on anonymous mode to take the pressure off while you catch up or plot your next move.
There's always something, isn’t there? Registration is required to compete in BOTS. No game-day registration is allowed.
Registration for .conf22 is available at this link and you can register for BOTS at https://bots.splunk.com. For any questions, please reach out to bots@splunk.com.
Follow all the conversations coming out of #splunkconf22!
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.
Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.