Skip to main content
false
.conf®18 sessions

Building a Security Monitoring Strategy With Splunk

Have you considered implementing a continuous security monitoring program but been daunted by the road ahead? This talk discusses various approaches for layering Splunk capabilities into a prescriptive security monitoring strategy that not only supports security operations in defense of the enterprise, but also helps achieve compliance objectives across a plethora of laws, regulations and recommendations, as well as reduce overall risk.

Watch this .conf18 session to learn about:

  • How we map requirements to use cases, core capabilities and advanced features within ES and other complementary apps
  • How to mature the SOC and begin to build out advanced security techniques within the enterprise organization
Download Now

Download Now

Continue