SlideShare une entreprise Scribd logo
1  sur  97
Copyright	©	2014	Splunk	Inc.
Guy	Weaver
Senior	System	Engineer
2
Agenda
What	is	the	Splunk App	for	Enterprise	Security?
Guided	Tour
– General	Overview
– Data	Ingest	and	Common	Information	Model
– Risk	and	Threat	Intel
– Incident	Response	Exercise
– Creating	a	Correlation	Search
Machine	data	contains	a	definitive	record	
of	all	interactions
Splunk	is	a	very	effective	platform	to	collect,	
store,	and	analyze	all	of	that	data
Human Machine
Machine Machine
Platform	for	Operational	Intelligence
The	Splunk	Portfolio
Rich	Ecosystem	of
Apps	&	Add-Ons
Splunk	Premium
Solutions
Mainframe
Data
Relational
Databases
MobileForwarders Syslog/TCP
IoT
Devices
Network
Wire	Data
Hadoop
5
ES	Fast	Facts
● Current	version:	4.0	
● Two	releases	per	year
● Content	comes	from	industry	experts,	market	analysis,	but	most	
importantly	YOU
● The	best	of	Splunk	carries	through	to	ES	– flexible,	scalable,	fast,	
and	customizable
● ES	has	its	own	development	team,	dedicated	support,	services	
practice,	and	training	courses
ES	Guided	Tour
7
Other	Items	To	Note
Items	to	Note
Navigation	- How	to	Get	
Here
Description	of	what	to	click	on
Click
Logging	In	and	
Security	Posture
9
Security	Posture
9
How	do	you	start	and	end	your	day?
10
11
Instance URL Username Password
1 https://od-sl-detroit01.splunkoxygen.com Demo_user Splunk4ES
2 https://od-sl-detroit02.splunkoxygen.com Demo_user Splunk4ES
3 https://od-sl-detroit03.splunkoxygen.com Demo_user Splunk4ES
4 https://od-sl-detroit04.splunkoxygen.com Demo_user Splunk4ES
5 https://od-sl-detroit05.splunkoxygen.com Demo_user Splunk4ES
6 https://od-sl-detroit06.splunkoxygen.com Demo_user Splunk4ES
7 https://od-sl-detroit07.splunkoxygen.com Demo_user Splunk4ES
8 https://od-sl-detroit08.splunkoxygen.com Demo_user Splunk4ES
12
Log	in	with	your	credentials.	Use	
any	modern	web	browser	(works	
better	with	non-IE).
Main	Login	Page	from	Link
13
13
Click	on	Enterprise	Security
After	Logging	In
14
ES	Content	dropdowns
Splunk app	context
Click	on	Security	Posture
Main	ES	Page	(from	App	
upper	left	hand	side)
15
Key	Security	Indicators	(build	your	own!)
Sparklines
Editable
Security	Posture	link	in	Nav
Data	Ingest	and	the
Common	Information	
Model	(CIM)
17
Data	Ingest	+	Common	Information	Model
17
● You’ve	got	a	ton	of	systems	
● How	to	bring	in:
● Network	AV
● Windows	+	OS	X	AV
● PCI-zone	Linux	AV
● Network	Sandboxing
● APT	Protection
● Splunk	+	CIM	is	Easy
18 18
Click	Add	Data,	under	Settings
Settings,	from	any	page	in	
Splunk
19 19
Bringing	Data	into	Splunk	
is	easy!
Data	Normalized	to	Common	
Information	Model
Under	Settings	(upper	right	
side),	Add	Data
Click	the	Cisco	app	
icon
20
CIM	Compliant!
Close	The	Tab
Splunkbase.com
Search	for	Cisco
21
Data	Models
21
Click	on	Data	models
Click	on	Pivot
next	to	Malware
22
Click	Malware	Attacks	to	PivotClick
From	Search	Nav Menu,	
select	Pivot	then	Malware
Nested	Models	– easily	distinguish	
subsets	of	data
23
Filter	Timeframe	to	Last	60	Minutes
Change
Total	count	of	attacks
Change	to	Area	Chart	to	show	
Attacks	over	Time
Click
From	Search	Nav Menu,	select	Pivot,	
then	Malware,	then	Malware	Attacks
24
The	time	range	we	selected
Split	out	by	Vendor	with	“Add	
Color”
Click
SCROLL	to	
vendor_product
CIM	has	many	
usable	attributes
25
For	as	many	vendors	as	you	have,	
pivot	and	report	across	any	field!
26
How	Does	This	Apply?
Let’s	Open	the	Malware	Center	to	See
Under	Security	Domains,	under	Endpoint,	
open	Malware	Center
27
Various	ways	to	filter	data
Malware-Specific	KSIs	and	Reports
Security	Domains	->	
Endpoint	->	Malware	Center
28
Searches	that	rely	on	
this	data	model
How	Complete	is	my	ES?
What	else	could	I	onboard?
Instructor	Only
Risk	Analysis
30
What	To	Do	First?
30
● Risk	provides	context
● Risk	helps	direct	analysts
“Risk	Analysis	is	my	favorite	dashboard
for	my	SOC	Analysts!”
31
Click	“Risk	Analysis”
Under	“Advanced	Threat”
Click
32
Filterable
KSIs	specific	to	Risk
Risk	assigned	to	system,	
user	or	other
Under	Advanced	Threat,	
select	Risk	Analysis
33
(Scroll	Down)
Recent	Risk	Activity
Under	Advanced	Threat,	
select	Risk	Analysis
34
Notable	Event	Risk	Preview!
34
From	Notable	Events
More	on	this	later…
…Or	Ad-Hoc	from	Risk	
Analysis	Dashboard
Threat	Activity
36 36Attack	Map
The	Challenge:
• Industry	says	Threat	Intel	is	
key	to	APT	Protection
• Management	 wants	all	
threat	intel	checked	against	
every	system,	constantly
• Don’t	forget	to	keep	your	
15+	threat	feeds	updated
The	Solution:
37
Click	“Threat	Activity”
Under	“Advanced	Threat”
Click
38
Filterable,	down	to	IoC
KSIs	specific	to	Threat
Most	active	threat	source
Scroll	down…
Scroll
Under	Advanced	Threat,	
select	Threat	Activity
39
Specifics	about	recent	threat	matches
Under	Advanced	Threat,	
select	Threat	Activity
40
To	add	threat	intel	go	to:
Configure	->	Data	Enrichment	->	
Threat	Intelligence	Downloads
Click
41
Threat	Intel	Downloads
42
Click	“Threat	Artifacts”
Under	“Advanced	Threat”
Click
43
Artifact	Categories	–
click	different	tabs…
STIX	feed
Custom	feed
Under	Advanced	Threat,	
select	Threat	Artifacts
The	Threat	Artifacts dashboard	provides	a	
single	location	to	explore	and	review	threat	
content	sourced	from	all	configured	threat	
download	sources.
44
Review	the	Advanced	Threat	
content
Click
Additional	Reports
46
Auditors	/	Management	/	Compliance	Says…
46
● Can	you	show	me	<Typical	Report>?
● Reporting	is	easy	in	Splunk
● But	we	have	more	than	
300	standard	reports	too
47
Click	“Reports”
Click
48
Over	330	reports	to	
use	or	customize
Under	Search,	select	Reports
Incident	Response	
Workflow
50 50
Go	to	Incident	ReviewClick
Sort	by	UrgencyClick
Find	Event	with	Your	Persona
Finally,	click	the	adjacent	“>”
Status	of	All	Tickets
Filter	on	owner,	urgency,	
status,	tag,	and	more
Explore	and	Analyze	Incidents
Incident	Review
51
View	Raw	Event
Data	from	asset	framework
Incident	Review,	expand	
incident	with	your	persona
52
Drill	down	on	
“10.116.240.105”	
and	select	Domain	Dossier
Click
Click
Pivot	off	of	everything.	Go	
internal	or	external.	
Customize.
Incident	Review,	expand	
incident	with	your	persona
53
Review	information	from	
external	lookup
Incident	Review	Tab	is	still	open.
Click	back	to	it	Incident	Review
In	your	Incident,	hit	Drop	
Down	next	to	Destination	
and	then	“Domain	Dossier”
54
Drill	down	on	
“10.116.240.105”	and	select	
“Intrusion	Search	(as	source)”
Click
Click
Incident	Review,	expand	
incident	with	your	persona
55
56
Drill	down	on	the	Source	field	
(10.116.240.105)	and	select	
“Asset	Investigator”
Click
Click
Incident	Review,	expand	
incident	with	your	persona
57
Data	from	asset	framework
Configurable	Swimlanes
Darker=more	events
All	happened	around	same	time
Change	to	
“Today”	if	needed
Asset	Investigator,	enter	
“10.116.240.105”
58
Select	“All	Authetication”	
vertical	bar
Asset	Investigator,	enter	
“10.116.240.105”
59
Asset	Investigator,	enter	
“10.116.240.105”
60 60
Click	Incident	Review
Click
61
Click
Incident	Review,	expand	
incident	with	your	persona
Click	Reimage	Workstation Click
Instructor	Only
62
Click
Totally	fake!	But	also	
totally	possible.
Instructor	Only
63
Select	your	Notable	
Event
Click
Then	click	
“Edit	all	selected”
64
Fill	out	Status:	Pending.	Urgency:	Low.	
Owner:	<your	persona>.	Comment:	
<whatever	you	want>.
Populate
Click
Incident	Review,	expand	
incident	with	your	persona
65
Click	to	Add	to	Investigation
Select	Event
66
67
Click
Click
68
Click
Add	Items
69
70
Click	“Incident	
Review	Audit”
Click
71
Click	a	reviewer	name
Under	Audit	menu,	select	
Incident	Review	Audit
72
Detailed	review	activity	
scoped	to	the	reviewer	
you	clicked	on.
Under	Audit	menu,	select	
Incident	Review	Audit
Creating	a	
Correlation	Search
74
They	Got	You	Once,	Never	Again
74
● Chris	opened	PDF	because	it	was	
legitimate	(before	weaponizing)
● They	brute	forced	portal	to	get	PDF
● You	successfully	find	the	attack
● How	do	you	alert	moving	forward?
75
Select	
“Zeus	Demo”	
Click
76
In	App	Menu	(upper	left),	
select	Zeus	Demo
77
Returns	data	if	we	see	a	lot	of	
logon	attempts	and	then	access	
to	portal	admin	pages	from	a	
single	IP	on	a	known	threat	list
In	Find	menu	(upper	right)	
type	“Portal	Brute	Force”
78
We	COULD	select	this	text,	
copy	it,	and	use	it	in	a	
correlation	search…but	let’s	
make	it	easy.
79
Go	back	to	the	Enterprise	
Security	app
80
Select	“Custom	Searches”	
under	Configure	->	General
In	App	Menu	(upper	left),	
select	Enterprise	Security
81
~200	correlation	searches,	
KSIs,	Swimlanes,	etc
Click	“New”
In	ES,	select	Configure	->	
General	->	Custom	Searches
82
Click	“Correlation	Search”
Select	Configure	->	General			
->	Custom	Searches	->	New
83
Click	the	link!
Then	click	save…
Select	Configure	->	General			->	Custom	
Searches	->	New	->	Correlation	Search
Explore	Risk	settings!
84
Return	to	Incident	
Review
85
Search	for	events	
owned	by	you	
(remove	All)
Note	custom	description
Incident	Review
Wrap	Up
87 87
Bringing	Data	into	Splunk	
is	easy!
Data	Normalized	till	
Common	Information	Model
88
For	as	many	vendors	as	you	have,	
pivot	and	report	across	any	field!
89
Filterable
KSIs	specific	to	Risk
Risk	assigned	to	system,	
user	or	other
90
91
Over	330	reports	to	
use	or	customize
92 92
Status	of	All	Tickets
Filter	on	owner,	urgency,	
status,	tag,	and	more
Explore	and	Analyze	Incidents
93
94
95
Note	custom	description
Copyright	©	2014	Splunk	Inc.
• September	26-29,	2016	
• The	Disney	Swan	and	Dolphin,	Orlando
• 5000+		IT	&	Business	Professionals
• 3	days	of	technical	content
• 165+	sessions
• 3	days	of	Splunk	University
• Sept	24-26,	2016
• Get	Splunk	Certified	for	FREE!	
• Get	CPE	credits	for	CISSP,	CAP,	SSCP
• Save	thousands	 on	Splunk	education!	
• 80+	Customer	Speakers
• 35+	Apps	in	Splunk	Apps	Showcase
• 75+	Technology	Partners
• 1:1	networking:	Ask	The	Experts	and
• Security	Experts,	Birds	of	a	Feather	and	 Chalk	Talks
• NEW	hands-on	labs!	
• Expanded	show	floor,	Dashboards	Control	Room	&	
Clinic,	and	MORE!	
Visit	conf.splunk.com for	more	information	
.conf2016:	The	7th Annual	
Splunk	Worldwide	Users’	Conference
Thank	You

Contenu connexe

Tendances

Tendances (20)

Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
 
Wazuh Security Platform
Wazuh Security PlatformWazuh Security Platform
Wazuh Security Platform
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk
 
Splunk-Presentation
Splunk-Presentation Splunk-Presentation
Splunk-Presentation
 
Implementing and Running SIEM: Approaches and Lessons
Implementing  and Running SIEM: Approaches and LessonsImplementing  and Running SIEM: Approaches and Lessons
Implementing and Running SIEM: Approaches and Lessons
 
Splunk for IT Operations
Splunk for IT OperationsSplunk for IT Operations
Splunk for IT Operations
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
 
Enterprise Security and User Behavior Analytics
Enterprise Security and User Behavior AnalyticsEnterprise Security and User Behavior Analytics
Enterprise Security and User Behavior Analytics
 
SIEM (Security Information and Event Management)
SIEM (Security Information and Event Management)SIEM (Security Information and Event Management)
SIEM (Security Information and Event Management)
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
Splunk Enterprise 6.4
Splunk Enterprise 6.4Splunk Enterprise 6.4
Splunk Enterprise 6.4
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
Splunk Architecture
Splunk ArchitectureSplunk Architecture
Splunk Architecture
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
Learn how to use an Analytics-Driven SIEM for your Security Operations
Learn how to use an Analytics-Driven SIEM for your Security OperationsLearn how to use an Analytics-Driven SIEM for your Security Operations
Learn how to use an Analytics-Driven SIEM for your Security Operations
 
Splunk workshop-Threat Hunting
Splunk workshop-Threat HuntingSplunk workshop-Threat Hunting
Splunk workshop-Threat Hunting
 
Sqrrl and IBM: Threat Hunting for QRadar Users
Sqrrl and IBM: Threat Hunting for QRadar UsersSqrrl and IBM: Threat Hunting for QRadar Users
Sqrrl and IBM: Threat Hunting for QRadar Users
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 

En vedette

Marcha anti alta tensión 12-jun-2010
Marcha anti alta tensión 12-jun-2010Marcha anti alta tensión 12-jun-2010
Marcha anti alta tensión 12-jun-2010
satorramail
 
Asian Mistories
Asian Mistories Asian Mistories
Asian Mistories
shvax
 
Etapa 01 - Algeciras/Argamasilla
Etapa 01 - Algeciras/ArgamasillaEtapa 01 - Algeciras/Argamasilla
Etapa 01 - Algeciras/Argamasilla
Antonio Casado
 
UisraelGeometriayTrigonometria La Recta De Euler
UisraelGeometriayTrigonometria La Recta De EulerUisraelGeometriayTrigonometria La Recta De Euler
UisraelGeometriayTrigonometria La Recta De Euler
Uisrael
 
La ExploracióN Espacial Hoy
La ExploracióN Espacial HoyLa ExploracióN Espacial Hoy
La ExploracióN Espacial Hoy
guest70d519
 

En vedette (20)

Infopadres cogersa.doc
Infopadres cogersa.docInfopadres cogersa.doc
Infopadres cogersa.doc
 
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
 
Taller PràCtico De Internet
Taller PràCtico De InternetTaller PràCtico De Internet
Taller PràCtico De Internet
 
Nuestros integrantes y propuestas
Nuestros integrantes y propuestasNuestros integrantes y propuestas
Nuestros integrantes y propuestas
 
Marcha anti alta tensión 12-jun-2010
Marcha anti alta tensión 12-jun-2010Marcha anti alta tensión 12-jun-2010
Marcha anti alta tensión 12-jun-2010
 
Asian Mistories
Asian Mistories Asian Mistories
Asian Mistories
 
Jovenes
JovenesJovenes
Jovenes
 
Ambientes Personales De Aprendizaje
Ambientes Personales De AprendizajeAmbientes Personales De Aprendizaje
Ambientes Personales De Aprendizaje
 
Video conferencia 7 06
Video conferencia 7 06Video conferencia 7 06
Video conferencia 7 06
 
Principios Pun
Principios PunPrincipios Pun
Principios Pun
 
Presentacion
PresentacionPresentacion
Presentacion
 
Daniel Marco - TIC.cat
Daniel Marco - TIC.catDaniel Marco - TIC.cat
Daniel Marco - TIC.cat
 
Si es Posible!
Si es Posible! Si es Posible!
Si es Posible!
 
Facebook
FacebookFacebook
Facebook
 
Franquicias
FranquiciasFranquicias
Franquicias
 
Etapa 01 - Algeciras/Argamasilla
Etapa 01 - Algeciras/ArgamasillaEtapa 01 - Algeciras/Argamasilla
Etapa 01 - Algeciras/Argamasilla
 
UisraelGeometriayTrigonometria La Recta De Euler
UisraelGeometriayTrigonometria La Recta De EulerUisraelGeometriayTrigonometria La Recta De Euler
UisraelGeometriayTrigonometria La Recta De Euler
 
Taller Practico De Internet 1
Taller Practico De Internet 1Taller Practico De Internet 1
Taller Practico De Internet 1
 
La ExploracióN Espacial Hoy
La ExploracióN Espacial HoyLa ExploracióN Espacial Hoy
La ExploracióN Espacial Hoy
 
Bases
BasesBases
Bases
 

Similaire à Enterprise Security Guided Tour

SplunkLive! Denver - Nov 2012 - Interac
SplunkLive! Denver - Nov 2012 - InteracSplunkLive! Denver - Nov 2012 - Interac
SplunkLive! Denver - Nov 2012 - Interac
Splunk
 

Similaire à Enterprise Security Guided Tour (20)

SplunkLive! Denver - Nov 2012 - Interac
SplunkLive! Denver - Nov 2012 - InteracSplunkLive! Denver - Nov 2012 - Interac
SplunkLive! Denver - Nov 2012 - Interac
 
Getting Started with Splunk (Hands-On)
Getting Started with Splunk (Hands-On) Getting Started with Splunk (Hands-On)
Getting Started with Splunk (Hands-On)
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk Enterprise
 
Splunk for Enterprise Security Featuring UBA
Splunk for Enterprise Security Featuring UBASplunk for Enterprise Security Featuring UBA
Splunk for Enterprise Security Featuring UBA
 
Getting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionGetting Started with Splunk Breakout Session
Getting Started with Splunk Breakout Session
 
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...
Splunk Webinar: Webinar: Die Effizienz Ihres SOC verbessern mit neuen Funktio...
 
SplunkLive! Frankfurt 2018 - Get More From Your Machine Data with Splunk AI
SplunkLive! Frankfurt 2018 - Get More From Your Machine Data with Splunk AISplunkLive! Frankfurt 2018 - Get More From Your Machine Data with Splunk AI
SplunkLive! Frankfurt 2018 - Get More From Your Machine Data with Splunk AI
 
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
 
Splunk for ITOA Breakout Session
Splunk for ITOA Breakout SessionSplunk for ITOA Breakout Session
Splunk for ITOA Breakout Session
 
SplunkLive! - Splunk for Security
SplunkLive! - Splunk for SecuritySplunkLive! - Splunk for Security
SplunkLive! - Splunk for Security
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
 
Getting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionGetting Started with Splunk Breakout Session
Getting Started with Splunk Breakout Session
 
SplunkLive! Amsterdam 2015 Breakout - Getting Started with Splunk
SplunkLive! Amsterdam 2015 Breakout - Getting Started with SplunkSplunkLive! Amsterdam 2015 Breakout - Getting Started with Splunk
SplunkLive! Amsterdam 2015 Breakout - Getting Started with Splunk
 
SplunkLive! Paris 2016 - Plenary session
SplunkLive! Paris 2016 - Plenary sessionSplunkLive! Paris 2016 - Plenary session
SplunkLive! Paris 2016 - Plenary session
 
Splunk for Enterprise Security and User Behavior Analytics
 Splunk for Enterprise Security and User Behavior Analytics Splunk for Enterprise Security and User Behavior Analytics
Splunk for Enterprise Security and User Behavior Analytics
 
Getting Started with Splunk Enterprise Hands-On Breakout Session
Getting Started with Splunk Enterprise Hands-On Breakout SessionGetting Started with Splunk Enterprise Hands-On Breakout Session
Getting Started with Splunk Enterprise Hands-On Breakout Session
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout Session
 
SplunkLive! Customer Presentation – athenahealth
SplunkLive! Customer Presentation – athenahealthSplunkLive! Customer Presentation – athenahealth
SplunkLive! Customer Presentation – athenahealth
 
SplunkLive! Customer Presentation – athenahealth
SplunkLive! Customer Presentation – athenahealthSplunkLive! Customer Presentation – athenahealth
SplunkLive! Customer Presentation – athenahealth
 
SplunkLive! Atlanta Customer Presentation – Intercontinental Exchange
SplunkLive! Atlanta Customer Presentation – Intercontinental ExchangeSplunkLive! Atlanta Customer Presentation – Intercontinental Exchange
SplunkLive! Atlanta Customer Presentation – Intercontinental Exchange
 

Plus de Splunk

Plus de Splunk (20)

.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine
 
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
 
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica).conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
 
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International
 
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett .conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
 
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär).conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
 
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu....conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
 
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever....conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
 
.conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex).conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex)
 
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
 
Splunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11y
 
Splunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go KölnSplunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go Köln
 
Data foundations building success, at city scale – Imperial College London
 Data foundations building success, at city scale – Imperial College London Data foundations building success, at city scale – Imperial College London
Data foundations building success, at city scale – Imperial College London
 
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
 
SOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security Webinar
 
.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session
 
.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote
 
.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session
 
Inside SecOps at bet365
Inside SecOps at bet365 Inside SecOps at bet365
Inside SecOps at bet365
 

Dernier

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Dernier (20)

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 

Enterprise Security Guided Tour