Click here
to view this message in a browser window
|
Thursday, June 22 |
Consideration 1: Data is the Key to Unlocking Security Potential and Innovation |
To quickly show compliance, detecting, and preventing cyber-attacks and other IT issues, protecting data, and ensuring the availability of the State of California's digital services. By harnessing the power of data-driven strategies, organizations can unlock security potential and innovation, and effectively address the complex challenges that arise in the ever-evolving digital landscape. This approach underscores the significance of data analytics and insights to enhance an organization's security posture, ultimately fostering a more resilient and secure environment.
Attendees will learn how to:
- Harness the power of data-driven strategies to unlock security potential, drive innovation, and address complex challenges
- Ensure the protection and integrity of data and systems delivering vital services to the public, fostering trust and reliability
- Leverage data analytics to harness the expansive potential of data in California, effectively reducing risk and accelerating incident response
Speaker: Chris Perkins, Staff Solutions Architect, Splunk
|
Thursday, June 29 |
Consideration 2: Your Security Analysis Platform
Should be Vendor Agnostic and Provide Exceptional Vendor Support
|
The volume, speed, and diversity of data that are crucial to State of California will keep growing both presently and in the future. Organizations with systems and processes in place to appropriately handle this will benefit greatly from the ability to meet dynamic stakeholder needs, ensure digital resilience, and keep pace with innovation.
Attendees will learn how:
- The data emitted by each of these technologies, infrastructure components, and applications vary in format, schema, and protocol
- To leverage the Splunk extensive ecosystem and vendor created apps that plug directly into Splunk to facilitate consumption, field mapping, and data visualizations for those technologies
- To ensure compliance, scalability, and bridge the gap between "islands of excellence" and "islands of neglect" using best-of-breed technology vendors as a driving motivation for each State entity
Speaker: Robert Alvarez, Senior Sales Engineer, Splunk
|
Thursday, July 13
|
Consideration 3: Your Security Analysis Platform Needs
to Embrace Flexible Deployment Models
|
The State uses SIEM solutions from multiple vendors. To support the broad range of participating agencies with unique operating constraints, regulatory requirements, and security support models. As stated in the Strategic Plan, by sharing core capabilities and leveraging a partnership with the California Cybersecurity Integration Center (Cal-CSIC) as the central organizing hub of state government’s cybersecurity activities, the state could dramatically increase its ability to detect, protect, and respond to cybersecurity threats.
Attendees will learn how to:
- Integrate with other vendor's SIEM products and establish compatibility within a heterogeneous SIEM environment, allowing aggregation and distribution of security alerts for a comprehensive view
- Address security and risk management, compliance, IT optimization and consolidation, citizen services delivery, and smart infrastructure initiatives
- Enable state agencies to harness data from diverse sources and achieve a comprehensive view of their organization, facilitating prompt and confident decision-making
Speaker: Shawn Jones, Cloud CSE, Splunk
|
Thursday, July 20 |
Consideration 4: Your Security Analysis Platform Needs to
Easily Integrate With Automation to Ease the Burden on State Agencies
|
Automation will serve as a force multiplier and a pivotal factor in the success of the Cal-Secure strategic plan. A SOAR platform will accelerate the time-to-action of security incidents, leverage existing tools to increase ROI, reduce alert fatigue, and eliminate repetitive tasks.
Attendees will learn how to:
- Streamline workflows and processes for security analysts to automate the handoff of tasks between different security tools and systems
- Effectively respond to security incidents by utilizing playbooks and workflows that guide through the steps to contain, investigate, and remediate a threat
- Utilize automation to establish a centralized communication and information sharing platform, enhancing visibility, and enabling effective collaboration among stakeholders during security incidents
Speaker: Zach Christensen, Consulting Solutions Engineer, Splunk
|
Thursday, July 27
|
Consideration 5: Risk-based Approaches to Security Are
Critical and Unlock Non-Traditional Security Analysis Possibilities
|
A risk-based approaches holds great importance because the process of understanding and identifying risks is no longer static. Although specific objects or actions may remain relevant, the ability to identify active risk factors and integrate them with historical data to evaluate current risks, is indispensable in modern security operations accurately and efficiently.
Attendees will learn how to:
- Implement risk-based analysis in state agencies to eliminate alert fatigue and allocate more time for high-value activities in security operations, including threat hunting, adversary simulation, and security content development
- Address the pervasive issue of fraud across government agencies and mitigate the severe consequences, including financial losses and reputational damage, by understanding common fraud investigation types
- Enable investigative staff to detect and handle massive amounts of fraudulent claims effectively
Speaker: Collin Gross, Senior Sales Engineer, Splunk
|
Thursday, August 3
|
Consideration 6: Your Security Analysis Platform Should Embrace
Important Security Frameworks Such as the MITRE ATT&CK Framework
|
Cybersecurity frameworks have become a baseline for security for most organizations. It helps organizations understand risks and threats in order to implement security accordingly. An organization can comply with multiple frameworks and also tweak the guidelines to better fit their use cases. Although different frameworks follow different approaches, the core idea remains, improving security.
Attendees will learn how to:
- Apply the MITRE ATT&CK framework to SIEM deployments to help security teams understand their threat coverage and identify areas that require attention
- Visualize the MITRE ATT&CK detections and explore visualizations on notable events as a security analyst
- Use the MITRE ATT&CK framework to identify gaps in the set of deployed detections in your SIEM
Speaker: Kevin Haynes, Staff Sales Engineer, Splunk
|
Thursday, August 10
|
Consideration 7: Your IT Modernization Effort Should
Have Security Resilience Built In
|
As the State of California adopts new technologies and processes, they may also become exposed to new threats and vulnerabilities. Building security resilience into modernization efforts ensures that systems and applications are designed with security best practices in mind, reducing the risk of cyberattacks and data breaches. Other considerations include compliance with regulations, enhanced service continuity, and improved end user trust.
Attendees will learn how to:
- Search, analyze, and visualize for actionable insights from all of your user data to ensure end user satisfaction
- Visualize and analyze collected data to identify redundancies, underutilized resources, and inefficiencies within an organization's business and IT services
- Develop and adopt a unified security and observability platform and applications
Speakers: Sam Scudere-Weiss, Senior Sales Engineer, Splunk
Shuning Gao, Senior Sales Engineer, Splunk
|
Thursday, August 17
|
Consideration 8: The Crucial Role of a Robust People and Process
Enablement Ecosystem for Security Analysis Platforms
|
Due to post-pandemic changes in the workforce that left skills gaps within state and local government agencies. The Great Resignation was a period where 40% of the U.S. workforce considered leaving their jobs in 2021, and about 34 million resigned. California led the country with 66,000 cybersecurity job openings because cybersecurity is a priority for the state.
Attendees will learn how to:
- Overcome challenges in attracting and retaining qualified staff
- Utilize the Splunk ecosystem for the development and training of a diverse, innovative cybersecurity workforce
- Increase opportunities to source to cybersecurity talent
Speakers: Tina Carkhuff, Industry Advisor - Public Sector: SLED, Splunk
Frank Myers, Strategic Advisor for SLED, Splunk
|
|
Click here to update your email preferences
|
By supplying my contact information, I authorize Carahsoft and its vendors and partner community to contact me with personalized communications about their products and services. Please review our Privacy Policy for more details or to opt-out at any time
|
© 2023 Carahsoft Technology Corp. 11493 Sunset Hills Road Reston, Virginia 20190
|
|