Security threats are a business problem - everyone's impacted. Security teams are overwhelmed by alert volume, have disconnected tools, and can be challenged to respond to what's important to the business at that moment. Cybersecurity and business requirements must be aligned to enable fast, intelligent, understanding of high-risk events and the potential impacts to the business.
Check out our upcoming workshops and executive briefings below to learn more about risk-based alerting!
Date & Time | Session |
Thursday, February 10th 11:00am PT; 2:00pm ET 1 hour | Splunk Security: Risk-Based Alerting Executive Briefing: Splunk Enterprise Security 6.6 introduced the Risk-Based Alerting (RBA) feature, which enables efficient incident response and risk scoring frameworks enabling security teams to quickly assess and appropriately respond to threats. Threats to the business can be quickly identified, prioritized, addressed, and remediated.
Click here to register! |
Wednesday, February 16th 9:00am PT; 12:00pm ET 4 hours | Splunk Risk-Based Alerting Hands-On Workshop: The lessons learned in this workshop will provide participants with the ability to begin deploying RBA with Enterprise Security. Initial goals include optimizing functions in the SOC such as detection engineering, triage, and investigations which ultimately free up cycles to focus on proactive activities such as adversary simulation, threat intelligence, SOAR, and threat hunting.
Click here to register! |
Tuesday, March 1st 1:30pm - 2:30pm MT 1 hour | Splunk Security: Risk-Based Alerting Executive Briefing: Splunk Enterprise Security 6.6 introduced the Risk-Based Alerting (RBA) feature, which enables efficient incident response and risk scoring frameworks enabling security teams to quickly assess and appropriately respond to threats. Threats to the business can be quickly identified, prioritized, addressed, and remediated.
Click here to register! |
Wednesday, March 2nd 9:00am - 1:00pm MT 4 hours | Splunk Risk-Based Alerting Hands-On Workshop: The lessons learned in this workshop will provide participants with the ability to begin deploying RBA with Enterprise Security. Initial goals include optimizing functions in the SOC such as detection engineering, triage, and investigations which ultimately free up cycles to focus on proactive activities such as adversary simulation, threat intelligence, SOAR, and threat hunting.
Click here to register! |
*Please note: to register for multiple sessions, you will
need to register through each individual link.
Can't wait to learn more? Read through the