Security Programs That Thrive in Econom...
With economic conditions causing concerns, many security teams with limited resources are sacrificing security initiatives for cost containment. All while expanding attack surfaces are requiring more time and attention than ever before. If this problem sounds familiar, join us to learn how managed detection and response solutions, integrated with existing security investments, can more quickly establish an acceptable ROI while dramatically re...
One Monitoring Tool to Rule Them All -...
Join us for a walkthrough of Splunk's newest feature. Visibility over distributed infrastructure is a huge problem for most of our city and state customers. With the move to hybrid infrastructure, the need for a solution that can monitor both private data centers and cloud deployed infrastructure has been at the forefront of all of our customer conversations. Register now to learn: What Observability is, and what it means for monitoring About...
Splunk JSP Workshop
Join us for session 1 of our Splunk JSP workshop where attendees will gain hands-on Splunk training to assist in future mission success.AgendaTimeTopic & Description9:00am - 9:15amKick-off: The Splunk team will kick-off what to expect over the day.9:00am - 12:00pmSplunk for Rookies: In this workshop, we will walk through a series of exercises designed to get someone new to Splunk to the point where they understand what Splunk is and what i...
CMMC Compliance Affecting Higher Ed
Don’t let CMMC jeopardize your research funding! Let Splunk and Qmulos do the heavy lifting for you. You’ve got the funding. We’ve got the solution. Qmulos is excited to be hosting a virtual thought leadership discussion, regarding CMMC 2.0, and how using the right technology stack can simplify and ensure security measures. As CMMC adoption progresses, leaders will increasingly depend on real-time, continuous assessment and c...
October 20, 2022
Organizer:
Qmulos Location:
Webcast
Splunk Security Ninja Workshop EMEA Ser...
Please note these workshop take place during European working hours. Welcome to Splunk Security Ninja Workshop Series. These 4 hour, hands-on security workshops are brought to you by the Splunk team via Zoom. Learn, connect & interact with Splunk subject matter experts, colleagues and industry peers, and have some fun on the way! Google Cloud Platform Security This is a scenario-based hands-on workshop designed for Splunk security customer...
September 28, 2022
Organizer:
Splunk Location:
Virtual
Leveraging Splunk for RMF Compliance ...
The RMF process is carried out as a set of well-defined, risk-related tasks by individuals or groups with well-defined roles within the organization. Splunk can be leveraged to assist agencies in facilitating and enabling their RMF process, specifically with Steps 4 (Assess) and 6 (Monitor). Join us for a walk-through on how to leverage this powerful big data solution for real-time reporting and alerting based on machine data aggregation from...
Financial Agencies: Improve Anomaly Det...
The phrase "insider threat" often evokes not only headaches, but the mental image of a disgruntled coworker scheming on how best to bring an organization to a grinding halt. While this is absolutely an example of an insider threat, there is way more to an insider threat program than looking for web searches on "how to steal money from my employer like they did in Office Space and/or Superman 3."In this session, engineers from Splunk will revie...
Splunk Security for NPOs Virtual Worksh...
This hands-on virtual workshop is designed to familiarize participants with how to leverage Splunk to search security events. Splunk experts will provide users a way to gain familiarity with searching in Splunk, as well as introducing a set of commands that allow users to effectively examine their security events. We will leverage the popular Boss of the SOC (BOTS) dataset in a question-and-answer format. Join us for a virtual workshop where a...
Solving STIGs and Automating Compliance...
Federal security professionals within the DoD must comply with the technical testing and hardening frameworks known as STIGs -- Security Technical Implementation Guides. STIGs contain technical guidance for "locking down" or "hardening" information systems and software that might be vulnerable to a malicious computer attack.While security is perhaps the single most important task federal IT professionals tackle, it's also the most complex. The...
Achieve Governance and Visibility with...
Organizations face rapidly changing demands and increasingly agile procurements as the pace of technology innovation continues to accelerate. They encounter costly legacy software licensing and maintenance, drawn out procurement cycles that can inhibit innovation, and a lack of visibility into organizational software usage. Modern organizations rely on digital transformation to streamline the software supply chain, optimize productivity, accel...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.