This post was co-authored by Stefano Tiranardi , a sales engineering director based in Canada.
Your cybersecurity team walks into the office, and their day is instantly taken off the rails. They get an alert informing them that something on the network is acting suspiciously. It isn’t necessarily a threat, but they don’t have the tools to know for sure. After looking into it, they learn that a SaaS provider for one of their departments delivered an update that caused a service degradation.
Thankfully, it isn’t an attack. But it’s still been an inefficient use of the team’s time.
Take this scenario and multiply it by a thousand. Companies can field anywhere from dozens to hundreds of incoming “alerts” every day, and they struggle to get through them in a timely manner because:
All of this creates an environment where a small team handles an increasingly complicated IT environment. Cybersecurity professionals worry that major issues will get lost in a flood of minor alerts or that they act too quickly on an alert without adequate context and negatively impact a legitimate business service. Many experience alert fatigue trying to follow up on them all for fear that the alert they didn’t get to was the biggest threat.
The result is overworked cybersecurity teams unable to guard increasingly vulnerable organizations against a growing number of adversaries, both external and internal.
Cyber professionals need a more efficient way to view, assess, and prioritize system alerts before devoting time to investigations.
In an effort to increase customer success, we’ve introduced Security Workshops: a virtual, interactive, and hands-on learning series that empowers cybersecurity professionals to make their jobs easier through visualization, investigation, and automation.
In these workshops, cybersecurity professionals learn the basics of Splunk’s interface before using simulated data to tackle specific cybersecurity scenarios they’d expect to see within their own organisations.
Overall, these workshops give participants a safe sandbox environment for learning and experimentation.
During these security workshops, participants will learn how to:
Here are a few examples of scenarios and lessons participants can expect during these Wednesday workshops.
Figure 1: Identifying where a brute force attack originated.
Figure 2: Identifying the first suspect domain visited by the victim
Figure 3: Identifying a malicious file
Figure 4: Identifying file server connections from an infected host
Figure 5: Determining which web server is the target
Figure 6: Finding the IP scanning a web server
The Splunk Security Cloud and our security workshops have three main goals:
Our workshops accomplish this in several ways by:
Interested in learning more? Register for a Canada Security Workshop! Not located in Canada? Find a workshop in your timezone.
----------------------------------------------------
Thanks!
Dino Marasco
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.
Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.