Extending Splunk to Business Use Cases With Automated Process MiningSplunk
Operational teams in lines of business, like finance, manufacturing, marketing, or customer service are looking for the same benefits of Splunk that IT and Security team have enjoyed for years. With the rapid digitization of nearly every business process, Splunk can identify millions of dollars in operational efficiencies by helping detect customer fallout and process bottlenecks. Built-in reports from applications don’t provide the broad visibility needed to understand end-to-end processes. Meanwhile, basic process mining approaches don’t provide deeper root cause diagnosis. Splunk Business Flow has the unique ability to provide continuous insights on and diagnosis of end-to-end customer journeys and business processes. In this session, learn how Splunk’s innovations in automated process mining can empower your operational business users with in-depth visibility into customer funnels and business processes to dramatically reduce fallout and bottlenecks.
Splunk AI & Machine Learning Roundtable 2019 - ZurichSplunk
Splunk Artificial Intelligence and Machine Learning Roundtable held in Zurich on November 6th 2019. Presented by Philipp Drieger, Staff Machine Learning Architect.
Looking into 2020 and beyond, we are certainly going to continue this trend of strategic technology investment and architecture evolution. This session’s aim is to highlight Splunk platform evolutionary approach to address key technology trends. Additionally, many customers are adopting Serverless cloud services to deliver their cloud solutions. This session will include a live demo of a new library of functions which provides Google Cloud Platform (GCP) serverless “push” capability to send data into Splunk, via HTTP Event Collector (HEC).
Extending Splunk to Business Use Cases With Automated Process MiningSplunk
Operational teams in lines of business, like finance, manufacturing, marketing, or customer service are looking for the same benefits of Splunk that IT and Security team have enjoyed for years. With the rapid digitization of nearly every business process, Splunk can identify millions of dollars in operational efficiencies by helping detect customer fallout and process bottlenecks. Built-in reports from applications don’t provide the broad visibility needed to understand end-to-end processes. Meanwhile, basic process mining approaches don’t provide deeper root cause diagnosis. Splunk Business Flow has the unique ability to provide continuous insights on and diagnosis of end-to-end customer journeys and business processes. In this session, learn how Splunk’s innovations in automated process mining can empower your operational business users with in-depth visibility into customer funnels and business processes to dramatically reduce fallout and bottlenecks.
Splunk AI & Machine Learning Roundtable 2019 - ZurichSplunk
Splunk Artificial Intelligence and Machine Learning Roundtable held in Zurich on November 6th 2019. Presented by Philipp Drieger, Staff Machine Learning Architect.
Looking into 2020 and beyond, we are certainly going to continue this trend of strategic technology investment and architecture evolution. This session’s aim is to highlight Splunk platform evolutionary approach to address key technology trends. Additionally, many customers are adopting Serverless cloud services to deliver their cloud solutions. This session will include a live demo of a new library of functions which provides Google Cloud Platform (GCP) serverless “push” capability to send data into Splunk, via HTTP Event Collector (HEC).
AI and Machine Learning can be used for the greater good. Why should AI be applied and what are the main challenges that have to be tackled when harnessing the power of AI for social good? Find out more here.
Leveraging Splunk Enterprise Security with the MITRE’s ATT&CK FrameworkSplunk
Threat Models and Methodologies such as MITRE’s ATT&CK knowledge base are growing in popularity to help track adversaries and map Tactics, Techniques and Procedures (TTP’s) to build and measure security defence profiles. This session will provide an introduction to MITRE’s ATT&CK Methodology and show how Splunk Enterprise Security (ES) and Splunk content updates can help you leverage MITRE ATT&CK in your defensive strategies.
Supercharge your decision making
Aimed at business and technology leaders to show how they can make better better business decisions, faster using the power of data.
In a world of increasing complexity, it’s more important than ever to understand the wider context whilst moving at speed.Learn how to supercharge your decision making.
Better Threat Analytics: From Getting Started to Cloud Security Analytics and...Splunk
Fighting the Eternal Challenge: Dealing with Alert Fatigue and Getting Insights into Security Productivity.
Lessons for a Fast Start in Automation and Orchestration.
Turning Data Into Business Outcomes with the Splunk PlatformSplunk
This presentation + demo introduces the differentiated value of the Splunk platform, and describes how Splunk helps customers navigate the digital evolution. This includes an introduction to Splunk Next, a collection of new technologies designed to enable expansive data access, empowering more users to deliver actionable outcomes.
Still Suffering from IT Outages? Accept Failure, Learn from Failure and Get R...Splunk
IT operations is only continuing to grow in complexity. There are too many alerts for human operators to process and little to no visibility into which alerts are business impacting. And it’s only getting worse with the addition of new devices and the growing list of services being employed by organisations — slowing detection and resolution times. Why is this a problem? Legacy IT solutions have left organisations in a complex and manual state. With too many siloed tools, productivity for IT remains low, and they’re often plagued in their inability to find the exact root cause.
Mit der Splunk Plattform Daten in Mehrwert umwandelnSplunk
Diese Session und Demo stellt den vielschichtigen Mehrwert der Splunk Plattform vor und beschreibt, wie Splunk Unternehmen dabei hilft, durch die digitale Evolution zu navigieren. Diese Session enthält auch eine Einführung zu Splunk Next, eine Sammlung neuer Technologien, die mehr Anwendern dabei helfen soll, fundierte Entscheidungen auf Basis von Daten zu treffen.
AI and Machine Learning can be used for the greater good. Why should AI be applied and what are the main challenges that have to be tackled when harnessing the power of AI for social good? Find out more here.
Leveraging Splunk Enterprise Security with the MITRE’s ATT&CK FrameworkSplunk
Threat Models and Methodologies such as MITRE’s ATT&CK knowledge base are growing in popularity to help track adversaries and map Tactics, Techniques and Procedures (TTP’s) to build and measure security defence profiles. This session will provide an introduction to MITRE’s ATT&CK Methodology and show how Splunk Enterprise Security (ES) and Splunk content updates can help you leverage MITRE ATT&CK in your defensive strategies.
Supercharge your decision making
Aimed at business and technology leaders to show how they can make better better business decisions, faster using the power of data.
In a world of increasing complexity, it’s more important than ever to understand the wider context whilst moving at speed.Learn how to supercharge your decision making.
Better Threat Analytics: From Getting Started to Cloud Security Analytics and...Splunk
Fighting the Eternal Challenge: Dealing with Alert Fatigue and Getting Insights into Security Productivity.
Lessons for a Fast Start in Automation and Orchestration.
Turning Data Into Business Outcomes with the Splunk PlatformSplunk
This presentation + demo introduces the differentiated value of the Splunk platform, and describes how Splunk helps customers navigate the digital evolution. This includes an introduction to Splunk Next, a collection of new technologies designed to enable expansive data access, empowering more users to deliver actionable outcomes.
Still Suffering from IT Outages? Accept Failure, Learn from Failure and Get R...Splunk
IT operations is only continuing to grow in complexity. There are too many alerts for human operators to process and little to no visibility into which alerts are business impacting. And it’s only getting worse with the addition of new devices and the growing list of services being employed by organisations — slowing detection and resolution times. Why is this a problem? Legacy IT solutions have left organisations in a complex and manual state. With too many siloed tools, productivity for IT remains low, and they’re often plagued in their inability to find the exact root cause.
Mit der Splunk Plattform Daten in Mehrwert umwandelnSplunk
Diese Session und Demo stellt den vielschichtigen Mehrwert der Splunk Plattform vor und beschreibt, wie Splunk Unternehmen dabei hilft, durch die digitale Evolution zu navigieren. Diese Session enthält auch eine Einführung zu Splunk Next, eine Sammlung neuer Technologien, die mehr Anwendern dabei helfen soll, fundierte Entscheidungen auf Basis von Daten zu treffen.
Abenteuer bei Monitoring und TroubleshootingSplunk
In der Vergangenheit hatte die IT immer damit zu kämpfen, dass Tools in Silos aufgehängt waren. Dadurch mangelte es an Visibiltät und Vorhersagbarkeit, was für SREs und Administratoren immer eine ziemliche Herausfordrung war. Erfahren Sie, wie Splunk für alle Ihre Teams eine einheitliche Monitoring-Möglichkeit bietet mittels einer modernen, skalierbaren Lösung. Dadurch lassen sich Probleme vermeiden bzw schneller lösen und die Produktivität steigern.
Mit Splunk Artificial Intelligence und Machine Learning mehr aus Ihren Daten ...Splunk
Diese Session liefert einen Überblick über das KI Angebot in unserem Portfolio, inklusive Splunk Enterprise, IT Service Intelligence, Splunk Enterprise Security und Splunk UBA. Sie erhalten einen Einblick, wie KI und Machine Learning in IT Ops, Security, IoT und Business Analytics Use Cases angewendet werden kann.
This presentation + demo will provide an overview of AI and machine learning offerings across the Splunk portfolio -- including Splunk Cloud and Splunk Enterprise, Splunk Machine Learning Toolkit, Splunk IT Service Intelligence, Splunk Enterprise Security and Splunk UBA -- and give you insight into how AI and ML can be applied across IT ops, security, IoT and business analytics use cases.
Splunk for Industrial Data and the Internet of Thingsaliciasyc
The IoT is a natural evolution of the world’s networks. Just as people became more connected by devices and applications during the explosion of the social media revolution, devices, sensors and industrial equipment are also becoming more connected—and are consuming and generating data at an unprecedented pace. Disparate and deployed connected devices can provide a unique touchpoint to real-world operations and conditions. Only few architectures and applications are designed to handle the constant streams of real-time events, sensor readings, user interactions and application data produced by massive numbers of connected devices. Use Splunk to collect, index and harness the power of the machine data generated by connected devices and machines deployed on your local network or around the world.
Machine Learning enables you to generate valuable insights from your machine data. In this talk, we will focus in particular on various methods for detecting anomalies. The presented methods can be used for applications in security and IT operations as well as in the area of IoT and business analytics. Because nothing is more unusual than the habit.
These are the slides from the webinar broadcast on April 1st 2020, presented by Philipp Drieger. Content covers:
- Introduction to AI and ML Features in Splunk
- Customer Use Case Examples
- Live Demo of Machine Learning Toolkit, with examples for:
Methods for Anomaly Detection, Predictive Analytics and Forecasting, and Clustering
- Custom Machine Learning, incl.: Advanced Containerization and Expansion with MLSPL API
Vorausschauendes, proaktives und collaboratives Machine Learning mit Splunk ITSISplunk
Die vorausschauenden Möglichkeiten des Machine Learning Toolkits (MLTK)zusammen mit ITSI's Event Analytics Fähigkeiten ermmöglichen es Operations Teams, proaktiv auf Events zu reagieren, bevor es zu einem Ausfall kommt. Diese Session befasst sich im Detail damit, wie Sie Splunk ITSI mit dem MLTK kombinieren, um einen Service Health Score vorherzusagen und es über Ihren Unternehmens-Messenger, z.B. Slack, mitzuteilen. Wir werden auch komplexe Suchkomandos zeigen, die Sie für besseres Incident Management nutzen können.
Accelerate Incident Response with Orchestration & AutomationSplunk
Daily IT security operations processes have not changed significantly over the past decade, but that all stands to change now that a new technology has arrived—enabling security teams to work smarter, respond faster, and improve their defenses. With Security Orchestration, Automation and Response (SOAR) technology, mundane processes can be handled by computers, allowing the SOC team to focus on identifying and responding to the real threats and attacks. This session examines traditional SOC processes and what becomes possible with a SOAR platform like Splunk Phantom. Whether it's a two-person security operation or a full complement SOC, learn to identify the processes that computers can handle on your behalf, and how to go beyond simple use cases and leverage all of the available security tools in your arsenal to the max.
More Than Monitoring: How Observability Takes You From Firefighting to Fire P...DevOps.com
For some, observability is just a hollow rebranding of monitoring, for others it’s monitoring on steroids. But what if we told you observability is the new way to find out why—not just if—your distributed system or application isn’t working as expected? Today, we see that traditional monitoring approaches can fall short if a system or application doesn’t adequately externalize its state.
This is truer as workloads move into the cloud and leverage ephemeral technologies, such as microservices and containers. To reach observability, IT and DevOps teams need to correlate different sources from logs, metrics, traces, events and more. This becomes even more challenging when defining the online revenue impact of a failed container—after all, this is what really matters to the business.
This webinar will cover:
The differences between observability and monitoring
Why it is a bigger challenge in a multicloud and containerized world
How observability results in less firefighting and more fire prevention
How new platforms can help gain observability (on premises and in the cloud) for containers, microservices and even SAP or mainframes
Delivering New Visibility and Analytics for IT OperationsSplunk
If you're just getting started with Splunk, this session will help you understand how to use Splunk software to turn your silos of data into insights that are actionable. In this session, we’ll dive right into a Splunk environment and show you how to use the simple Splunk search interface to quickly find the needle-in-the-haystack or multiple needles in multiple haystacks. We’ll demonstrate how to perform rapid ad-hoc searches to conduct routine investigations across your entire IT infrastructure in one place, whether physical, virtual or in the cloud. We’ll show you how to then convert these searches into real time alerts and dashboards, so you can proactively monitor for problems before they impact your end user. We'll demonstrate how you can use Splunk to connect the dots across heterogeneous systems in your environment for cross-tier, cross-silo visibility. You'll have access to a demo environment. So, don't forget to bring your laptop and follow along for a hands-on experience.
Similar to Splunk Discovery Köln - 17-01-2020 - Turning Data Into Business Outcomes (20)
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...Splunk
.conf Go 2023 presentation:
"Das passende Rezept für die digitale (Security) Revolution zur Telematik Infrastruktur 2.0 im Gesundheitswesen?"
Speaker: Stefan Stein -
Teamleiter CERT | gematik GmbH M.Eng. IT-Sicherheit & Forensik,
doctorate student at TH Brandenburg & Universität Dresden
.conf Go 2023 presentation:
De NOC a CSIRT
Speakers:
Daniel Reina - Country Head of Security Cellnex (España) & Global SOC Manager Cellnex
Samuel Noval - Global CSIRT Team Leader, Cellnex
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk
BMW is defining the next level of mobility - digital interactions and technology are the backbone to continued success with its customers. Discover how an IT team is tackling the journey of business transformation at scale whilst maintaining (and showing the importance of) business and IT service availability. Learn how BMW introduced frameworks to connect business and IT, using real-time data to mitigate customer impact, as Michael and Mark share their experience in building operations for a resilient future.
Data foundations building success, at city scale – Imperial College LondonSplunk
Universities have more in common with modern cities than traditional places of learning. This mini city needs to empower its citizens to thrive and achieve their ambitions. Operationalising data is key to building critical services; from understanding complex IT estates for smarter decision-making to robust security and a more reliable, resilient student experience. Juan will share his experience in building data foundations for a resilient future whilst enabling digital transformation at Imperial College London.
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk
Learn how Vodafone has provided end-to-end visibility across services by building an Operational Analytics Platform. In this session, you will hear how Stefan and his team manage legacy, on premise, hybrid and public cloud services, and how they are providing a platform for complex triage and debugging to tackle use cases across Vodafone’s extensive ecosystem.
.italo operates an Essential Service by connecting more than 100 million people annually across Italy with its super fast and secure railway. And CISO Enrico Maresca has been on a whirlwind journey of his own.
Formerly a Cyber Security Engineer, Enrico started at .italo as an IT Security Manager. One year later, he was promoted to CISO and tasked with building out – and significantly increasing the maturity level – of the SOC. The result was a huge step forward for .italo.
So how did he successfully achieve this ambitious ask? Join Enrico as he reveals the key insights and lessons learned in his SOC journey, including:
Top challenges faced in improving security posture
Key KPIs implemented in order to measure success
Strategies and approaches applied in the SOC
How MITRE ATT&CK and Splunk Enterprise Security were utilised
Next steps in their maturity journey ahead
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host