ON-DEMAND
Threat hunting has become standard practice in organizations to proactively find bad actors operating within the organization. Previously, reliance was placed solely on the SIEM to detect these issues, but it became clear that a passive approach will not suffice with persistent adversaries. Organizations of all sizes are now performing threat hunting to catch behavior that is difficult to detect automatically and decrease the dwell time of the adversary.
Threat hunting is a loaded term for purists who consider this any manual searching within the environment for adversaries beyond SIEM alerts. For others, threat hunting helps identify gaps in their coverage to justify onboarding additional data sources. Finally, less sophisticated or novice hunters may take new threat intelligence indicators and search against their existing datasets for previous interactions. All of these are valid within Splunk, but the terminology means different things to different organizations.
Come for the discussion, stay for the Whiskey Cocktails! Following the panel, we’ll host an interactive whiskey tasting session.
Time | Place | Details |
---|---|---|
10:00am - 10:55am | Expo Hall | Meet and greet in the lobby outside the Expo Hall before the General Assembly. |
11:00am - 11:55am | Rm 314 | Expert Track: TOP 10 WAYS TO MAKE A DIFFERENCE IN THE INDUSTRY | John Dough, CFO Marketizingly |
11:00am - 11:55am | Rm 159 | Social Track: MODERN NETWORKING | Hosted by: SponsorName |
Pellentesque non magna eget ex lobortis finibus. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Etiam nec arcu non eros hendrerit viverra a vitae libero. Etiam et ultricies nulla. Donec euismod lectus magna, eu dignissim mauris hendrerit vulputate.
Director of Security
at Smile Direct
Sr. Cloud Cybersecurity Architect
at McGraw Hill
Director of Information Security
at Goodwin