![Splunk [Security, Compliance and Fraud Track] 2019 .conf Videos w/ Slides](https://i0.wp.com/raw.githubusercontent.com/tonytamsf/splunk-conf-rss/master/images/conf-logo.png?resize=512,512)
Splunk [Security, Compliance and Fraud Track] 2019 .conf Videos w/ Slides
by Splunk
December 24, 2019 11:10 am
Splunk [Security, Compliance and Fraud Track] 2019 .conf Videos w/ Slides Splunk User Behavior Analytics (UBA) contains the largest library of unsupervised machine learning in the market. In this session we’ll show how to analyze data from both cloud and on-premises data sources in both types of deployment (cloud/on-premises) to convey the unique benefits of Splunk UBA. We’ll discuss real world examples that showcase the importance of using UBA and all other tools at your disposal for day-to-day threat hunting. Specifically, we’ll show how to use Splunk Enterprise, Splunk Enterprise Security, and Splunk UBA together to hunt and detect anomalies that can reveal significant threats. We’ll wrap up with best and worst practices from deployments seen throughout the world.
Speaker(s)
Tom Smit, Staff Sales Engineer, Splunk
Slides PDF link – https://conf.splunk.com/files/2019/slides/SEC1248.pdf?podcast=1577146214
Product: Splunk Enterprise, Splunk Enterprise Security, Splunk User Behavior Analytics, AI/ML
Track: Security, Compliance and Fraud
Level: Intermediate
Recent Episodes
Advanced Threat Hunting and Anomaly Detection with Splunk UBA [Splunk Enterprise, Splunk Enterprise Security, Splunk User Behavior Analytics, AI/ML]
5 years ago00:00/00:00Anatomy of an Attack []
5 years ago00:00/00:00Attacking and Defending Kubernetes: A Purple Team Approach to Improving Detection Using Splunk Enterprise Security, Splunk Phantom and Peirates [Splunk Enterprise Security, Phantom]
5 years ago00:00/00:00ATT&CK™ing Linux with SPL [Splunk Enterprise, Splunk Enterprise Security]
5 years ago00:00/00:00ATT&CK™ Yourself Before Someone Else Does [Splunk Enterprise, Splunk Enterprise Security, Phantom]
5 years ago00:00/00:00Augment Your Security Monitoring Use Cases with Splunk's Machine Learning Toolkit [Splunk Enterprise, Splunk Machine Learning Toolkit, AI/ML]
5 years ago00:00/00:00Automate Forensic Investigations in AWS with Splunk [Splunk Enterprise]
5 years ago00:00/00:00Automate Your Phishing Response with Splunk Enterprise Security, Splunk Phantom, and Machine Learning [Splunk Enterprise, Splunk Enterprise Security, Phantom]
5 years ago00:00/00:00Best Practices for Rapid Containment of Incidents [Splunk Enterprise, Phantom]
5 years ago00:00/00:00Beyond Tier 1 Automation: The Hidden Value of Splunk Phantom Automation for Security Operations [Splunk Enterprise, Phantom]
5 years ago00:00/00:00