Slides from the GDPR Security Roundtable hosted in Zurich. Part 2 of 2.
“The aim of the GDPR is to protect all EU citizens from privacy and data breaches in an increasingly data-driven world" - Goal of the General Data Protection Regulation.
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1Splunk
Slides from the GDPR Security Roundtable hosted in Zurich. Part 1 of 2.
“The aim of the GDPR is to protect all EU citizens from privacy and data breaches in an increasingly data-driven world" - Goal of the General Data Protection Regulation.
You’re a CIO, CISO or DPO - and you’ve been woken up in the middle of the night because personal data held by your organization has been discovered for sale on the dark web. This disclosure puts the privacy of your customers at risk. What do you do next?
Join this session to learn about the impact of GDPR and go through a breach investigation and response scenario as it would be after GDPR comes into effect in May 2018. You’ll hear from Splunk’s Data Privacy Officer Elizabeth Davies and Splunk’s Security Ninja Matthias Maier.
What you will learn:
- What breach response will look like under the GDPR
- What tools and processes a data privacy officer will rely on in case of a breach
- What departments and entities will be involved beyond IT
- What activities are currently happening within organizations to prepare for the GDPR
- What the consequences of the breach could be
Watch the webinar: http://explore.splunk.com/GDPR_Webinar_EN
A Day in the Life of a GDPR Breach - September 2017: Germany Splunk
You’re a CIO, CISO or DPO - and you’ve been woken up in the middle of the night because personal data held by your organisation has been discovered for sale on the dark web. This disclosure puts the privacy of your customers at risk. What do you do next? Splunk's own Matthias Maier and Elizabeth Davies explore the future scenario.
Splunk Forum Frankfurt - 15th Nov 2017 - GDPR / EU-DSGVOSplunk
This document discusses the EU General Data Protection Regulation (GDPR) and how Splunk can help organizations comply with it. It provides an overview of key GDPR requirements such as fines, data breach notification timelines, and mandatory privacy impact assessments. It then describes a hypothetical scenario where an organization experiences a data breach and must quickly investigate and respond to meet GDPR obligations. Finally, it outlines several Splunk resources that can help organizations use machine data to support GDPR requirements like breach investigation, security monitoring, and personal data processing.
A Day in the Life of a GDPR Breach - September 2017: France Splunk
You’re a CIO, CISO or DPO - and you’ve been woken up in the middle of the night because personal data held by your organisation has been discovered for sale on the dark web. This disclosure puts the privacy of your customers at risk. What do you do next? Splunk's own Mathieu Dessus and Elizabeth Davies explore the future scenario.
GDPR Complaince: Don't Let SIEM BE Your DownfallSplunk
Whatever SIEM solution you operate, it is highly likely that personal information is captured in the log data such as phone numbers, email addresses, cookies, RFID’s, geolocation and more. If it can identify an individual in combination with other data, you must ensure that you’re not in breach of the GDPR. To help give guidance on this, we have conducted detailed analysis on how you should treat your SIEM solution and log data under the GDPR.
•Learn the most relevant aspects of GDPR, to understand its impact on log management
•Understand the risk of processing and storing log data in the context of GDPR
•Discover your obligations and the precautions you can take to comply and maintain visibility
•Observe specific compliance guidance and relevant use cases for network and information security logs
Splunk Discovery Dusseldorf: September 2017 - Security SessionSplunk
The Splunk experience came to Dusseldorf on September 20th 2017! Attendees learnt how to bring together all their different systems to help achieve their security goals.
Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT1Splunk
Slides from the GDPR Security Roundtable hosted in Zurich. Part 1 of 2.
“The aim of the GDPR is to protect all EU citizens from privacy and data breaches in an increasingly data-driven world" - Goal of the General Data Protection Regulation.
You’re a CIO, CISO or DPO - and you’ve been woken up in the middle of the night because personal data held by your organization has been discovered for sale on the dark web. This disclosure puts the privacy of your customers at risk. What do you do next?
Join this session to learn about the impact of GDPR and go through a breach investigation and response scenario as it would be after GDPR comes into effect in May 2018. You’ll hear from Splunk’s Data Privacy Officer Elizabeth Davies and Splunk’s Security Ninja Matthias Maier.
What you will learn:
- What breach response will look like under the GDPR
- What tools and processes a data privacy officer will rely on in case of a breach
- What departments and entities will be involved beyond IT
- What activities are currently happening within organizations to prepare for the GDPR
- What the consequences of the breach could be
Watch the webinar: http://explore.splunk.com/GDPR_Webinar_EN
A Day in the Life of a GDPR Breach - September 2017: Germany Splunk
You’re a CIO, CISO or DPO - and you’ve been woken up in the middle of the night because personal data held by your organisation has been discovered for sale on the dark web. This disclosure puts the privacy of your customers at risk. What do you do next? Splunk's own Matthias Maier and Elizabeth Davies explore the future scenario.
Splunk Forum Frankfurt - 15th Nov 2017 - GDPR / EU-DSGVOSplunk
This document discusses the EU General Data Protection Regulation (GDPR) and how Splunk can help organizations comply with it. It provides an overview of key GDPR requirements such as fines, data breach notification timelines, and mandatory privacy impact assessments. It then describes a hypothetical scenario where an organization experiences a data breach and must quickly investigate and respond to meet GDPR obligations. Finally, it outlines several Splunk resources that can help organizations use machine data to support GDPR requirements like breach investigation, security monitoring, and personal data processing.
A Day in the Life of a GDPR Breach - September 2017: France Splunk
You’re a CIO, CISO or DPO - and you’ve been woken up in the middle of the night because personal data held by your organisation has been discovered for sale on the dark web. This disclosure puts the privacy of your customers at risk. What do you do next? Splunk's own Mathieu Dessus and Elizabeth Davies explore the future scenario.
GDPR Complaince: Don't Let SIEM BE Your DownfallSplunk
Whatever SIEM solution you operate, it is highly likely that personal information is captured in the log data such as phone numbers, email addresses, cookies, RFID’s, geolocation and more. If it can identify an individual in combination with other data, you must ensure that you’re not in breach of the GDPR. To help give guidance on this, we have conducted detailed analysis on how you should treat your SIEM solution and log data under the GDPR.
•Learn the most relevant aspects of GDPR, to understand its impact on log management
•Understand the risk of processing and storing log data in the context of GDPR
•Discover your obligations and the precautions you can take to comply and maintain visibility
•Observe specific compliance guidance and relevant use cases for network and information security logs
Splunk Discovery Dusseldorf: September 2017 - Security SessionSplunk
The Splunk experience came to Dusseldorf on September 20th 2017! Attendees learnt how to bring together all their different systems to help achieve their security goals.
Build a Security Portfolio That Strengthens Your Security PostureSplunk
All data is security relevant – whether you are an IT or security professional, it is important to gain context into all your data to understand your environment, quickly hunt for and investigate potential threats in your environment, and take action to remediate.
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with SplunkSplunk
This document outlines an agenda and presentation for a Splunk workshop on reactive to proactive troubleshooting and monitoring. The agenda includes an introduction to Splunk for IT operations, hands-on IT operations exercises, an overview of relevant Splunk apps, an introduction to Splunk IT Service Intelligence, and customer stories. The presentation discusses how Splunk can help transform IT from reactive problem solving to proactive monitoring and operational intelligence. It highlights key Splunk capabilities like searching, monitoring, alerting and visualizing machine data from various sources to improve troubleshooting, uptime, and IT productivity. [/SUMMARY]
Splunk ITOA Roundtable - Zurich: 30th November 2017Splunk
Presentation slides from the Splunk ITOA roundtable event that took place in Zurich, November 2017. Attendees learnt:
- What is machine learning
- Why machine learning is critical for today's IT
- The challenges you will need to overcome
- Some real examples of machine learning use cases
- How to get started to machine learning
Splunk Discovery Dusseldorf: September 2017 - IT Ops SessionSplunk
The Splunk experience came to Dusseldorf on September 20th 2017! Attendees learnt how to bring together all their different systems to help achieve their security goals.
This document provides an agenda for a Splunk Discovery Day event being held in Milwaukee on September 14, 2017. The agenda includes sessions on Machine Data 101, delivering new visibility and analytics for IT operations, and strengthening security posture. It notes there will be over 100 attendees, 3 sessions, and a happy hour. Breaks and a closing are also included. [/SUMMARY]
.conf2016: Splunking the Endpoint: “Hands on!” Ransomware EditionSplunk
Agenda:
Ransomware overview
How do we log in?
Hands-On: Detection by watching the endpoints
Hands-On: A diversion over to forensics
Hands-On: Ideas for prevention
Ransomware detection, cybersecurity, data analytics and application.
Threat Hunting with Deceptive Defense and Splunk Enterprise SecuritySatnam Singh
Threat hunting has been primarily a playground for security experts in surfacing unknown threats. It is a proactive security approach where the hunt starts with a hypothesis about a hidden threat that may be already in the enterprise network. According to 2017 survey on threat hunting by the SANS Institute, nearly 45% of organizations hunt on an ad hoc basis. The ad hoc approach is ineffective and does not yield sufficient results to cover the cost of threat hunting. Considering the scarcity of security analysts, the ad hoc threat hunting becomes a costly and expensive process. Also, threat hunting is typically performed by doing outlier detection of the data. For example, analysts usually do outlier detection to find suspicious processes out of Windows process logs. The outlier detection can be done using simple box plots, control charts, or using more sophisticated unsupervised machine learning techniques. However, the output of all the outlier detection techniques is outliers/anomalies that still need to be audited/investigated by the security analysts. This adds more workload to the already overwhelmed security analyst.
The fusion of data science and deceive security provides an opportunity to validate many alerts automatically and therefore provides an automated approach from threat hunting. Deceptive defense system offers a way to confirm an adversary presence with nearly 0% false alarms when the adversary bumps onto one of the deceptions. The modern set of deceptions is the reincarnation of honeypots, honeytokens, honeynets, and honey files that blends well within the network and can dynamically change their configurations. When an adversary access a deception, it raises a positive affirmation of a threat. In this approach, one needs to use alerts and contextual security events along with deceptive security to rank the existing alerts. It takes away a lot of manual verification of various security alerts.
The document is a presentation on threat hunting with Splunk. It discusses threat hunting basics and data sources, the cyber kill chain model, and conducting a hands-on attack scenario investigation using Splunk. It also covers advanced threat hunting techniques and tools, applying machine learning and data science to security, and increasing an organization's threat hunting maturity. The presentation includes examples of using Splunk to investigate a hypothetical attack spanning multiple stages of the cyber kill chain using various security data sources.
The document is a presentation on threat hunting with Splunk. It discusses threat hunting basics, data sources for threat hunting, knowing your endpoint, and the cyber kill chain model. It provides an agenda that includes a hands-on walkthrough of an attack scenario using Splunk's core capabilities. It also covers advanced threat hunting techniques and tools, enterprise security walkthroughs, and applying machine learning and data science to security.
Learn how to use an Analytics-Driven SIEM for your Security OperationsSplunk
Join our Security Experts and learn about our Analytics-Driven SIEM, Splunk Enterprise Security (ES) in a live, hands-on session. You will start off with a hands-on tour of Splunk's award-winning SIEM, Splunk Enterprise Security and understand its key frameworks and its unique capabilities. Then, you will work on hands-on exercises that involve threat detection, incident investigation and how to take rapid responses using data from a range of sources such as threat list intelligence feeds, endpoint activity logs, e-mail logs, and web logs. This session is a must session for all security practitioners.
Splunk live nyc_2017_sec_buildinganalyticsdrivensocRene Aguero
The document is a presentation by Rene Aguero on building an analytics-driven security operations center (SOC) using Splunk solutions. It discusses challenges with traditional SOCs, emerging trends like threat hunting and automation, and the key components of a SOC technology stack including log management, asset tracking, threat intelligence, and case management. It then outlines how Splunk solutions can help address these issues by providing a platform for centralized data collection, correlation with threat intelligence, and advanced analytics including machine learning.
This document outlines an agenda for a training on threat hunting with Splunk. It discusses threat hunting basics and data sources for threat hunting including network, endpoint, threat intelligence and security information. It provides log in credentials for the hands-on portion and covers topics like the cyber kill chain framework, conducting searches on endpoint data with Sysmon, mapping network communications to processes, and walking through a demo attack scenario across multiple data sources.
What breach response will look like under the GDPR
What tools and processes a data privacy officer will rely on in case of a breach
What departments and entities will be involved beyond IT
What activities are currently happening within organizations to prepare for the GDPR
SplunkLive! Stockholm 2017 - ABN AMRO Customer PresentationSplunk
This document discusses ABN AMRO Bank's use of Splunk in their Security Operations Center (SOC). It provides background on ABN AMRO as a leading bank in the Netherlands. It then discusses the threats facing the bank, including phishing emails, DDoS attacks, and unknown malware. It describes how the SOC initially struggled with too much data but that Splunk helped detect these threats. It concludes that threats will continue to change so infrastructure must be prepared to change with them, and that organizations should monitor their own security operations.
- The Security Posture dashboard provides a near real-time overview of an organization's security posture by displaying notable security events.
- The analyst can pivot from this dashboard to the Incident Review dashboard to begin investigating critical notable events.
- Drilling into a notable event on the Incident Review dashboard provides important context about the event such as the affected systems, compliance data, and location to assist the analyst's investigation.
Splunk Discovery Day Dubai 2017 - Security KeynoteSplunk
This document discusses Splunk's security vision, strategy, and platform. It outlines Splunk's positioning as a leader in security information and event management. It describes Splunk's security portfolio and how the platform can be used to prevent, detect, respond to and predict security threats. It also provides examples of how Splunk has helped customers in various industries improve their security operations and gain insights from security and other machine data.
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with SplunkSplunk
ITOA user-beginner Splunk Admin-new to Splunk
Description: If you’re just getting started with Splunk, this session will help you understand how to use Splunk software to turn your silos of data into insights that are actionable. In this session, we’ll dive right into a Splunk environment and show you how to use the simple Splunk search interface to quickly find the needle-in-the-haystack or multiple needles in multiple haystacks. We’ll demonstrate how to perform rapid ad hoc searches to conduct routine investigations across your entire IT infrastructure in one place, whether physical, virtual or in the cloud. We’ll show you how to then convert these searches into real-time alerts and dashboards, so you can proactively monitor for problems before they impact your end user. We’ll also demonstrate how you can use Splunk to connect the dots across heterogeneous systems in your environment for cross-tier, cross-silo visibility.
You’ll have access to a demo environment. So, don’t forget to bring your laptop and follow along for a hands-on experience.
NetskopeTM is the leader in cloud app analytics and policy enforce- ment. Only Netskope eliminates the catch-22 between being agile and being secure and compliant by providing complete visibility, enforcing sophisticated policies, and protecting data in cloud apps.
This document provides an introduction to several cybersecurity standards and regulations, including ISO 27001, FFIEC, and GDPR. It describes the purpose and key aspects of each, such as ISO 27001 focusing on establishing an information security management system, FFIEC assessing cybersecurity maturity, and GDPR strengthening data protection for EU individuals. The document also gives an overview of Mauritius' new data protection act aligned with GDPR and provides some free resources for further information.
This document provides an overview of data loss prevention (DLP). It discusses cyber security risks and increasing data breach statistics and costs. It defines DLP and the lifecycle of data protection. Key aspects of a DLP implementation are outlined, including defining objectives and scope, policy setup, data discovery and classification, monitoring and tuning, and reporting. The benefits of visibility, monitoring, and improved protection are highlighted.
The evolving threats and the challenges of the modern CISOisc2-hellenic
This document summarizes a presentation given by Gerasimos Moschonas on the evolving threats facing CISOs and the challenges they face. It discusses how threats are becoming more advanced as attacks grow more aggressive and attackers become more professional. It also examines how the role of CISO has evolved from an IT security administrator to an independent and strategic role responsible for information security governance. Specific threats discussed include big data, the internet of things, cybercrime, social engineering, mobility, and an increasingly regulated environment. The challenges for CISOs are aligning security and business strategies, reducing risks to an acceptable level while protecting the business brand, and preparing for security incidents.
Isaca atlanta - practical data security and privacyUlf Mattsson
1. The document discusses various data security and privacy techniques such as tokenization, encryption, anonymization models, and standards. It provides examples of how these techniques can be applied on-premises and in cloud environments.
2. Major privacy regulations and standards discussed include the GDPR, CCPA, and ISO privacy standards. Key requirements around encryption, tokenization, and data mapping are examined.
3. Different data techniques are compared including differential privacy, homomorphic encryption, k-anonymity models, and their applications in analytics and machine learning.
Build a Security Portfolio That Strengthens Your Security PostureSplunk
All data is security relevant – whether you are an IT or security professional, it is important to gain context into all your data to understand your environment, quickly hunt for and investigate potential threats in your environment, and take action to remediate.
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with SplunkSplunk
This document outlines an agenda and presentation for a Splunk workshop on reactive to proactive troubleshooting and monitoring. The agenda includes an introduction to Splunk for IT operations, hands-on IT operations exercises, an overview of relevant Splunk apps, an introduction to Splunk IT Service Intelligence, and customer stories. The presentation discusses how Splunk can help transform IT from reactive problem solving to proactive monitoring and operational intelligence. It highlights key Splunk capabilities like searching, monitoring, alerting and visualizing machine data from various sources to improve troubleshooting, uptime, and IT productivity. [/SUMMARY]
Splunk ITOA Roundtable - Zurich: 30th November 2017Splunk
Presentation slides from the Splunk ITOA roundtable event that took place in Zurich, November 2017. Attendees learnt:
- What is machine learning
- Why machine learning is critical for today's IT
- The challenges you will need to overcome
- Some real examples of machine learning use cases
- How to get started to machine learning
Splunk Discovery Dusseldorf: September 2017 - IT Ops SessionSplunk
The Splunk experience came to Dusseldorf on September 20th 2017! Attendees learnt how to bring together all their different systems to help achieve their security goals.
This document provides an agenda for a Splunk Discovery Day event being held in Milwaukee on September 14, 2017. The agenda includes sessions on Machine Data 101, delivering new visibility and analytics for IT operations, and strengthening security posture. It notes there will be over 100 attendees, 3 sessions, and a happy hour. Breaks and a closing are also included. [/SUMMARY]
.conf2016: Splunking the Endpoint: “Hands on!” Ransomware EditionSplunk
Agenda:
Ransomware overview
How do we log in?
Hands-On: Detection by watching the endpoints
Hands-On: A diversion over to forensics
Hands-On: Ideas for prevention
Ransomware detection, cybersecurity, data analytics and application.
Threat Hunting with Deceptive Defense and Splunk Enterprise SecuritySatnam Singh
Threat hunting has been primarily a playground for security experts in surfacing unknown threats. It is a proactive security approach where the hunt starts with a hypothesis about a hidden threat that may be already in the enterprise network. According to 2017 survey on threat hunting by the SANS Institute, nearly 45% of organizations hunt on an ad hoc basis. The ad hoc approach is ineffective and does not yield sufficient results to cover the cost of threat hunting. Considering the scarcity of security analysts, the ad hoc threat hunting becomes a costly and expensive process. Also, threat hunting is typically performed by doing outlier detection of the data. For example, analysts usually do outlier detection to find suspicious processes out of Windows process logs. The outlier detection can be done using simple box plots, control charts, or using more sophisticated unsupervised machine learning techniques. However, the output of all the outlier detection techniques is outliers/anomalies that still need to be audited/investigated by the security analysts. This adds more workload to the already overwhelmed security analyst.
The fusion of data science and deceive security provides an opportunity to validate many alerts automatically and therefore provides an automated approach from threat hunting. Deceptive defense system offers a way to confirm an adversary presence with nearly 0% false alarms when the adversary bumps onto one of the deceptions. The modern set of deceptions is the reincarnation of honeypots, honeytokens, honeynets, and honey files that blends well within the network and can dynamically change their configurations. When an adversary access a deception, it raises a positive affirmation of a threat. In this approach, one needs to use alerts and contextual security events along with deceptive security to rank the existing alerts. It takes away a lot of manual verification of various security alerts.
The document is a presentation on threat hunting with Splunk. It discusses threat hunting basics and data sources, the cyber kill chain model, and conducting a hands-on attack scenario investigation using Splunk. It also covers advanced threat hunting techniques and tools, applying machine learning and data science to security, and increasing an organization's threat hunting maturity. The presentation includes examples of using Splunk to investigate a hypothetical attack spanning multiple stages of the cyber kill chain using various security data sources.
The document is a presentation on threat hunting with Splunk. It discusses threat hunting basics, data sources for threat hunting, knowing your endpoint, and the cyber kill chain model. It provides an agenda that includes a hands-on walkthrough of an attack scenario using Splunk's core capabilities. It also covers advanced threat hunting techniques and tools, enterprise security walkthroughs, and applying machine learning and data science to security.
Learn how to use an Analytics-Driven SIEM for your Security OperationsSplunk
Join our Security Experts and learn about our Analytics-Driven SIEM, Splunk Enterprise Security (ES) in a live, hands-on session. You will start off with a hands-on tour of Splunk's award-winning SIEM, Splunk Enterprise Security and understand its key frameworks and its unique capabilities. Then, you will work on hands-on exercises that involve threat detection, incident investigation and how to take rapid responses using data from a range of sources such as threat list intelligence feeds, endpoint activity logs, e-mail logs, and web logs. This session is a must session for all security practitioners.
Splunk live nyc_2017_sec_buildinganalyticsdrivensocRene Aguero
The document is a presentation by Rene Aguero on building an analytics-driven security operations center (SOC) using Splunk solutions. It discusses challenges with traditional SOCs, emerging trends like threat hunting and automation, and the key components of a SOC technology stack including log management, asset tracking, threat intelligence, and case management. It then outlines how Splunk solutions can help address these issues by providing a platform for centralized data collection, correlation with threat intelligence, and advanced analytics including machine learning.
This document outlines an agenda for a training on threat hunting with Splunk. It discusses threat hunting basics and data sources for threat hunting including network, endpoint, threat intelligence and security information. It provides log in credentials for the hands-on portion and covers topics like the cyber kill chain framework, conducting searches on endpoint data with Sysmon, mapping network communications to processes, and walking through a demo attack scenario across multiple data sources.
What breach response will look like under the GDPR
What tools and processes a data privacy officer will rely on in case of a breach
What departments and entities will be involved beyond IT
What activities are currently happening within organizations to prepare for the GDPR
SplunkLive! Stockholm 2017 - ABN AMRO Customer PresentationSplunk
This document discusses ABN AMRO Bank's use of Splunk in their Security Operations Center (SOC). It provides background on ABN AMRO as a leading bank in the Netherlands. It then discusses the threats facing the bank, including phishing emails, DDoS attacks, and unknown malware. It describes how the SOC initially struggled with too much data but that Splunk helped detect these threats. It concludes that threats will continue to change so infrastructure must be prepared to change with them, and that organizations should monitor their own security operations.
- The Security Posture dashboard provides a near real-time overview of an organization's security posture by displaying notable security events.
- The analyst can pivot from this dashboard to the Incident Review dashboard to begin investigating critical notable events.
- Drilling into a notable event on the Incident Review dashboard provides important context about the event such as the affected systems, compliance data, and location to assist the analyst's investigation.
Splunk Discovery Day Dubai 2017 - Security KeynoteSplunk
This document discusses Splunk's security vision, strategy, and platform. It outlines Splunk's positioning as a leader in security information and event management. It describes Splunk's security portfolio and how the platform can be used to prevent, detect, respond to and predict security threats. It also provides examples of how Splunk has helped customers in various industries improve their security operations and gain insights from security and other machine data.
Reactive to Proactive: Intelligent Troubleshooting and Monitoring with SplunkSplunk
ITOA user-beginner Splunk Admin-new to Splunk
Description: If you’re just getting started with Splunk, this session will help you understand how to use Splunk software to turn your silos of data into insights that are actionable. In this session, we’ll dive right into a Splunk environment and show you how to use the simple Splunk search interface to quickly find the needle-in-the-haystack or multiple needles in multiple haystacks. We’ll demonstrate how to perform rapid ad hoc searches to conduct routine investigations across your entire IT infrastructure in one place, whether physical, virtual or in the cloud. We’ll show you how to then convert these searches into real-time alerts and dashboards, so you can proactively monitor for problems before they impact your end user. We’ll also demonstrate how you can use Splunk to connect the dots across heterogeneous systems in your environment for cross-tier, cross-silo visibility.
You’ll have access to a demo environment. So, don’t forget to bring your laptop and follow along for a hands-on experience.
NetskopeTM is the leader in cloud app analytics and policy enforce- ment. Only Netskope eliminates the catch-22 between being agile and being secure and compliant by providing complete visibility, enforcing sophisticated policies, and protecting data in cloud apps.
This document provides an introduction to several cybersecurity standards and regulations, including ISO 27001, FFIEC, and GDPR. It describes the purpose and key aspects of each, such as ISO 27001 focusing on establishing an information security management system, FFIEC assessing cybersecurity maturity, and GDPR strengthening data protection for EU individuals. The document also gives an overview of Mauritius' new data protection act aligned with GDPR and provides some free resources for further information.
This document provides an overview of data loss prevention (DLP). It discusses cyber security risks and increasing data breach statistics and costs. It defines DLP and the lifecycle of data protection. Key aspects of a DLP implementation are outlined, including defining objectives and scope, policy setup, data discovery and classification, monitoring and tuning, and reporting. The benefits of visibility, monitoring, and improved protection are highlighted.
The evolving threats and the challenges of the modern CISOisc2-hellenic
This document summarizes a presentation given by Gerasimos Moschonas on the evolving threats facing CISOs and the challenges they face. It discusses how threats are becoming more advanced as attacks grow more aggressive and attackers become more professional. It also examines how the role of CISO has evolved from an IT security administrator to an independent and strategic role responsible for information security governance. Specific threats discussed include big data, the internet of things, cybercrime, social engineering, mobility, and an increasingly regulated environment. The challenges for CISOs are aligning security and business strategies, reducing risks to an acceptable level while protecting the business brand, and preparing for security incidents.
Isaca atlanta - practical data security and privacyUlf Mattsson
1. The document discusses various data security and privacy techniques such as tokenization, encryption, anonymization models, and standards. It provides examples of how these techniques can be applied on-premises and in cloud environments.
2. Major privacy regulations and standards discussed include the GDPR, CCPA, and ISO privacy standards. Key requirements around encryption, tokenization, and data mapping are examined.
3. Different data techniques are compared including differential privacy, homomorphic encryption, k-anonymity models, and their applications in analytics and machine learning.
Insights Into Modern Day Threat ProtectionAbhinav Biswas
This document discusses cybersecurity threats and strategies for mitigation. It covers topics like advanced persistent threats, zero-day attacks, exploit kits, and common attack vectors involving social media, email, mobile apps, and the web. The document also summarizes traditional threats compared to more advanced threats, outlines a 7-stage threat model, and emphasizes the importance of prevention, detection, and rapid response for effective cybersecurity.
GDPR and NIS Compliance - How HyTrust Can HelpJason Lackey
This document discusses how HyTrust Workload Security can help organizations address challenges related to the EU's General Data Protection Regulation (GDPR) and Network Information Security (NIS) Directive. It outlines key areas like privileged user misuse, data breaches, audit compliance that are affected by these regulations. HyTrust provides capabilities like encryption, logging, and policy enforcement across multiple clouds to help ensure data protection, demonstrate compliance, and respond rapidly to incidents in a way that reduces organizations' GDPR and NIS-related risks and pain points.
This document discusses the European Union's General Data Protection Regulation (GDPR) and how the log analysis software Splunk can help organizations comply with GDPR requirements. The GDPR aims to strengthen data protection for all EU citizens and applies to any company processing personal data of EU residents. It introduces fines of up to 4% of annual global turnover for violations. Splunk allows organizations to detect, prevent and investigate data breaches, search and report on personal data processing activities to comply with GDPR provisions, and prove that appropriate technical and organizational security measures are in place.
ISSA Atlanta - Emerging application and data protection for multi cloudUlf Mattsson
Personal data privacy will be the most prominent issue affecting how businesses gather, store, process, and disclose data in public cloud. Businesses have been inundated with information on what recent privacy laws like GDPR and CCPA require, but many are still trying to figure out how to comply with them on a practical level. Many companies are focusing on data privacy from the legal and security side, which are foundational, but are missing the focus on data. The good news is that these data privacy regulations compel businesses to get a handle on personal data — how they get it, where they get it from, which systems process it, where it goes internally and externally, etc. In other words, the new norms of data privacy require proactive data management, which enables organizations to extract real business value from their data, improve the customer experience, streamline internal processes, and better understand their customers.
The new Verizon Data Breach Investigations Report (DBIR) provides perspectives on how Criminals simply shift their focus and adapt their tactics to locate and steal the data they find to be of most value.
This session will discuss Emerging Application and Data Protection for Multi-cloud and review Differential privacy, Tokenization, Homomorphic encryption, and Privacy-preserving computation.
• Learn New Application and Data Protection Strategies
• Learn Advancements in Machine Learning
• Learn how to develop a roadmap for EU GDPR compliance
• Learn Data-centric Security for Digital Business
• Learn Where Data Security and Value of Data Meet in the Cloud
• Learn Data Protection On-premises, and in Public and Private Clouds
• Learn about Emerging Application and Data Protection for Multi-cloud
• Learn about Emerging Data Privacy and Security for Cloud
• Learn about New Enterprise Application and Data Security Challenges
• Learn about Differential privacy, Tokenization, Homomorphic encryption, and Privacy-preserving computation
The document discusses Trellix's data protection solutions. It provides an overview of the challenges organizations face in protecting data across multiple locations and devices as data grows exponentially. Trellix's data loss prevention framework uses discovery, classification, monitoring and enforcement across networks, endpoints, databases and clouds to protect sensitive data wherever it resides. Key capabilities include identifying sensitive data, user awareness and education, as well as incident response. Use cases discussed include insider threats, data privacy regulations, and security operations.
This document summarizes Forcepoint's approach to cybersecurity, which focuses on understanding the intersection of people, data, and networks. It advocates a "human-centric" approach that detects individuals posing the greatest risk based on their interactions with valuable data. Forcepoint offers a suite of integrated solutions that work together as a "Human Point System" to provide visibility, dynamic enforcement, and control across distributed systems. The system aims to address CISO concerns around data accessibility, unified security policy, determining critical alerts, and timely enforcement.
GDPR - Top 10 AWS Security and Compliance Best PracticesAhmad Khan
AWS Cloud GDPR challenges solved, this webinar (see our youtube channel). We show you exactly which Articles you need to worry about and how to address the data security using automation and top 10 best practices to implement step by step.
This document discusses Microsoft Cloud Deutschland and how it aims to provide a secure cloud solution for German customers that complies with German data protection laws. It begins with an introduction and overview of current privacy and security issues. It then discusses Microsoft Cloud Deutschland in more detail, describing its security features and certifications. It also discusses how Microsoft is preparing customers for the upcoming GDPR regulations through solutions in Azure, Azure AD, and Enterprise Mobility + Security.
Massive amounts of data and increasingly intelligent systems challenge existing data protection principles - from informed consent to opaque decisions and the distionction between personal and non-personal, as well as sensitive and non-sensitive data. Rather than compromising on fundamental rights, this presentation introduces the concept of Data Exploitation and argues that the minimisation of excessive data generation and collection is essential.
Presentation delivered at Computers Privacy & Data Protection Conference - PROTECTING INDIVIDUALS IN A BIG DATA WORLD. THE APPROACH ADOPTED BY THE COUNCIL OF EUROPE
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec
Learn more about the transfer of personal data across borders, including best practices for protecting your information against physical and virtual threats in order to maintain data integrity and confidentiality.
To view the on demand version of the webinar click here: https://symc.ly/2uLlDNf.
Continuous PCI and GDPR Compliance With Data-Centric SecurityTokenEx
Continuous PCI and GDPR Compliance With Data-Centric Security describes how to develop a data security environment that is GDPR and/or PCI DSS compliant by utilizing tokenisation to pseudonymize sensitive data. Contact: Sales@tokenex.com
5 key steps for SMBs for reaching GDPR ComplianceGabor Farkas
In this GDPR Compliance presentation, you can learn more about the key steps to take for GDPR Compliance, including:
- What are data management processes and how to identify them at small and medium sized businesses
- What is personal data under the GDPR and how to establish a record of processing activities to map personal data
- How does encryption help with safeguarding personal data and ensuring GDPR compliance
- What your business should do to get ready for the new General Data Protection regulation on time
Where data security and value of data meet in the cloud brighttalk webinar ...Ulf Mattsson
BrightTALK webinar January 14 2015
The biggest challenge in this new paradigm of the cloud and an interconnected world, is merging data security with data value and productivity. What’s required is a seamless, boundless security framework to maximize data utility while minimizing risk. In this webinar, you’ll learn about value-preserving data-centric security methods, how to keep track of your data and monitor data access outside the enterprise, and best practices for protecting data and privacy in the perimeter-less enterprise.
The document discusses managing information security risks and risk management. It covers identifying valuable information assets, threats to those assets like identity theft and hacking, and vulnerabilities in existing safeguards. It also discusses how to assess security spending based on asset value and risk likelihood. The document recommends understanding risks, accepting or mitigating risks, and outlines how MPC Security Solutions can help with services like security assessments, policy reviews, and monitoring/auditing tools.
Similar to Splunk GDPR Security Roundtable: Zurich - 22 Nov 2017 PT2 (20)
.conf Go 2023 - Raiffeisen Bank InternationalSplunk
This document discusses standardizing security operations procedures (SOPs) to increase efficiency and automation. It recommends storing SOPs in a code repository for versioning and referencing them in workbooks which are lists of standard tasks to follow for investigations. The goal is to have investigation playbooks in the security orchestration, automation and response (SOAR) tool perform the predefined investigation steps from the workbooks to automate incident response. This helps analysts automate faster without wasting time by having standard, vendor-agnostic procedures.
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...Splunk
.conf Go 2023 presentation:
"Das passende Rezept für die digitale (Security) Revolution zur Telematik Infrastruktur 2.0 im Gesundheitswesen?"
Speaker: Stefan Stein -
Teamleiter CERT | gematik GmbH M.Eng. IT-Sicherheit & Forensik,
doctorate student at TH Brandenburg & Universität Dresden
El documento describe la transición de Cellnex de un Centro de Operaciones de Seguridad (SOC) a un Equipo de Respuesta a Incidentes de Seguridad (CSIRT). La transición se debió al crecimiento de Cellnex y la necesidad de automatizar procesos y tareas para mejorar la eficiencia. Cellnex implementó Splunk SIEM y SOAR para automatizar la creación, remediación y cierre de incidentes. Esto permitió al personal concentrarse en tareas estratégicas y mejorar KPIs como tiempos de resolución y correos electrónicos anal
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)Splunk
Este documento resume el recorrido de ABANCA en su camino hacia la ciberseguridad con Splunk, desde la incorporación de perfiles dedicados en 2016 hasta convertirse en un centro de monitorización y respuesta con más de 1TB de ingesta diaria y 350 casos de uso alineados con MITRE ATT&CK. También describe errores cometidos y soluciones implementadas, como la normalización de fuentes y formación de operadores, y los pilares actuales como la automatización, visibilidad y alineación con MITRE ATT&CK. Por último, señala retos
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk
BMW is defining the next level of mobility - digital interactions and technology are the backbone to continued success with its customers. Discover how an IT team is tackling the journey of business transformation at scale whilst maintaining (and showing the importance of) business and IT service availability. Learn how BMW introduced frameworks to connect business and IT, using real-time data to mitigate customer impact, as Michael and Mark share their experience in building operations for a resilient future.
The document is a presentation on cyber security trends and Splunk security products from Matthias Maier, Product Marketing Director for Security at Splunk. The presentation covers trends in security operations like the evolution of SOCs, new security roles, and data-centric security approaches. It also provides updates on Splunk's security portfolio including recognition as a leader in SIEM by Gartner and growth in the SIEM market. Maier highlights some breakout sessions from the conference on topics like asset defense, machine learning, and building detections.
Data foundations building success, at city scale – Imperial College LondonSplunk
Universities have more in common with modern cities than traditional places of learning. This mini city needs to empower its citizens to thrive and achieve their ambitions. Operationalising data is key to building critical services; from understanding complex IT estates for smarter decision-making to robust security and a more reliable, resilient student experience. Juan will share his experience in building data foundations for a resilient future whilst enabling digital transformation at Imperial College London.
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk
Learn how Vodafone has provided end-to-end visibility across services by building an Operational Analytics Platform. In this session, you will hear how Stefan and his team manage legacy, on premise, hybrid and public cloud services, and how they are providing a platform for complex triage and debugging to tackle use cases across Vodafone’s extensive ecosystem.
.italo operates an Essential Service by connecting more than 100 million people annually across Italy with its super fast and secure railway. And CISO Enrico Maresca has been on a whirlwind journey of his own.
Formerly a Cyber Security Engineer, Enrico started at .italo as an IT Security Manager. One year later, he was promoted to CISO and tasked with building out – and significantly increasing the maturity level – of the SOC. The result was a huge step forward for .italo.
So how did he successfully achieve this ambitious ask? Join Enrico as he reveals the key insights and lessons learned in his SOC journey, including:
Top challenges faced in improving security posture
Key KPIs implemented in order to measure success
Strategies and approaches applied in the SOC
How MITRE ATT&CK and Splunk Enterprise Security were utilised
Next steps in their maturity journey ahead
This document summarizes a presentation about observability using Splunk. It includes an agenda introducing observability and why Splunk for observability. It discusses the need for modernization initiatives in companies and the thousands of changes required. It presents that Splunk provides end-to-end visibility across metrics, traces and logs to detect, troubleshoot and optimize systems. It shares a customer case study of Accenture using Splunk observability in their hybrid cloud environment. Finally, it concludes that observability with Splunk can drive results like reduced downtime and faster innovation.
This document contains slides from a Splunk presentation covering the following topics:
- Updated Splunk logo and information about meetings in Zurich and sales engineering leads
- Ideas for confused or concerned human figures in design concepts
- Three buckets of challenges around websites slowing, apps being down, and supply chain issues
- Accelerating mean time to detect, identify, respond and resolve through cyber resilience with Splunk
- Unifying security, IT and DevOps teams
- Splunk's technology vision focusing on customer experience, hybrid/edge, unleashing data lakes, and ubiquitous machine learning
- Gaining operational resilience through correlating infrastructure, security, application and user data with business outcomes
This document summarizes a presentation about Splunk's platform. It discusses Splunk's mission of helping customers create value faster with insights from their data. It provides statistics on Splunk's daily ingest and users. It highlights examples of how Splunk has helped customers in areas like internet messaging and convergent services. It also discusses upcoming challenges and new capabilities in Splunk like federated search, flexible indexing, ingest actions, improved data onboarding and management, and increased platform resilience and security.
The document appears to be a presentation from Splunk on security topics. It includes sections on cyber security resilience, the data-centric modern SOC, application monitoring at scale, threat modeling, security monitoring journeys, self-service Splunk infrastructure, the top 3 CISO priorities of risk based alerting, use case development, a security content repository, security PVP (posture, vision, and planning) and maturity assessment, and concludes with an overview of how Splunk can provide end-to-end visibility across an organization.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.