Download free for 30 days
Sign in
Upload
Language (EN)
Support
Business
Mobile
Social Media
Marketing
Technology
Art & Photos
Career
Design
Education
Presentations & Public Speaking
Government & Nonprofit
Healthcare
Internet
Law
Leadership & Management
Automotive
Engineering
Software
Recruiting & HR
Retail
Sales
Services
Science
Small Business & Entrepreneurship
Food
Environment
Economy & Finance
Data & Analytics
Investor Relations
Sports
Spiritual
News & Politics
Travel
Self Improvement
Real Estate
Entertainment & Humor
Health & Medicine
Devices & Hardware
Lifestyle
Change Language
Language
English
Español
Português
Français
Deutsche
Cancel
Save
Submit search
EN
Uploaded by
Splunk
PDF, PPTX
211 views
Splunk Security Update | Public Sector Summit Germany 2025
Splunk Security Update Sprecher: Marcel Tanuatmadja
Technology
◦
Read more
0
Save
Share
Embed
Embed presentation
Download
Download as PDF, PPTX
1
/ 20
2
/ 20
Most read
3
/ 20
4
/ 20
5
/ 20
6
/ 20
7
/ 20
8
/ 20
9
/ 20
10
/ 20
11
/ 20
12
/ 20
13
/ 20
14
/ 20
15
/ 20
16
/ 20
17
/ 20
18
/ 20
Most read
19
/ 20
20
/ 20
More Related Content
PDF
Splunk-Presentation
by
PrasadThorat23
PPTX
Exploring Frameworks of Splunk Enterprise Security
by
Splunk
PPTX
Splunk Enterprise Security
by
Splunk
PPTX
Threat Hunting with Splunk
by
Splunk
PDF
Power the SOC of the Future with scale, speed and choice - Splunk Public Sect...
by
Splunk EMEA
PDF
Threat Hunting Workshop
by
Splunk
PPTX
Exploring Frameworks of Splunk Enterprise Security
by
Splunk
PPTX
Build a Security Portfolio That Strengthens Your Security Posture
by
Splunk
Splunk-Presentation
by
PrasadThorat23
Exploring Frameworks of Splunk Enterprise Security
by
Splunk
Splunk Enterprise Security
by
Splunk
Threat Hunting with Splunk
by
Splunk
Power the SOC of the Future with scale, speed and choice - Splunk Public Sect...
by
Splunk EMEA
Threat Hunting Workshop
by
Splunk
Exploring Frameworks of Splunk Enterprise Security
by
Splunk
Build a Security Portfolio That Strengthens Your Security Posture
by
Splunk
Similar to Splunk Security Update | Public Sector Summit Germany 2025
PPTX
Threat Hunting
by
Splunk
PDF
Splunk Threat Hunting Workshop
by
Splunk
PDF
Splunk ES 8 mission controle data analytic
by
willmorekanan
PPTX
Make Your SOC Work Smarter, Not Harder
by
Splunk
PDF
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
by
Splunk
PDF
Splunk workshop-Threat Hunting
by
Splunk
PDF
Threat Hunting
by
Splunk
PPTX
Splunk enterprise security_splunk_bengaluru_user_group_2020_10_03
by
NiketNilay
PDF
Using Machine Learning and Analytics to Hunt for Security Threats - Webinar
by
Splunk
PPTX
Security crawl walk run presentation mckay v1 2017
by
Adam Tice
PPTX
Splunk Security Session - .conf Go Köln
by
Splunk
PPTX
Threat Hunting with Splunk
by
Splunk
PPTX
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
by
Splunk
PDF
Splunk for security
by
Greg Hanchin
PPTX
Splunk Discovery Day Dubai 2017 - Security Keynote
by
Splunk
PDF
Splunk for Security
by
Gabrielle Knowles
PDF
SplunkLive Wellington 2015 - Splunk for Security
by
Splunk
PDF
SplunkLive Auckland 2015 - Splunk for Security
by
Splunk
PPTX
Splunk for Enterprise Security featuring UBA Breakout Session
by
Splunk
PPTX
.conf Go Zurich 2022 - Security Session
by
Splunk
Threat Hunting
by
Splunk
Splunk Threat Hunting Workshop
by
Splunk
Splunk ES 8 mission controle data analytic
by
willmorekanan
Make Your SOC Work Smarter, Not Harder
by
Splunk
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
by
Splunk
Splunk workshop-Threat Hunting
by
Splunk
Threat Hunting
by
Splunk
Splunk enterprise security_splunk_bengaluru_user_group_2020_10_03
by
NiketNilay
Using Machine Learning and Analytics to Hunt for Security Threats - Webinar
by
Splunk
Security crawl walk run presentation mckay v1 2017
by
Adam Tice
Splunk Security Session - .conf Go Köln
by
Splunk
Threat Hunting with Splunk
by
Splunk
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
by
Splunk
Splunk for security
by
Greg Hanchin
Splunk Discovery Day Dubai 2017 - Security Keynote
by
Splunk
Splunk for Security
by
Gabrielle Knowles
SplunkLive Wellington 2015 - Splunk for Security
by
Splunk
SplunkLive Auckland 2015 - Splunk for Security
by
Splunk
Splunk for Enterprise Security featuring UBA Breakout Session
by
Splunk
.conf Go Zurich 2022 - Security Session
by
Splunk
More from Splunk
PDF
Splunk Leadership Forum Wien - 20.05.2025
by
Splunk
PDF
Building Resilience with Energy Management for the Public Sector
by
Splunk
PDF
IT-Lagebild: Observability for Resilience (SVA)
by
Splunk
PDF
Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)
by
Splunk
PDF
Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)
by
Splunk
PDF
Praktische Erfahrungen mit dem Attack Analyser (gematik)
by
Splunk
PDF
Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)
by
Splunk
PDF
Security - Mit Sicherheit zum Erfolg (Telekom)
by
Splunk
PDF
One Cisco - Splunk Public Sector Summit Germany April 2025
by
Splunk
PDF
.conf Go 2023 - Data analysis as a routine
by
Splunk
PDF
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
by
Splunk
PDF
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
by
Splunk
PDF
.conf Go 2023 - Raiffeisen Bank International
by
Splunk
PDF
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
by
Splunk
PDF
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
by
Splunk
PDF
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
by
Splunk
PDF
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
by
Splunk
PDF
.conf go 2023 - De NOC a CSIRT (Cellnex)
by
Splunk
PDF
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
by
Splunk
PPTX
Splunk - BMW connects business and IT with data driven operations SRE and O11y
by
Splunk
Splunk Leadership Forum Wien - 20.05.2025
by
Splunk
Building Resilience with Energy Management for the Public Sector
by
Splunk
IT-Lagebild: Observability for Resilience (SVA)
by
Splunk
Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)
by
Splunk
Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)
by
Splunk
Praktische Erfahrungen mit dem Attack Analyser (gematik)
by
Splunk
Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)
by
Splunk
Security - Mit Sicherheit zum Erfolg (Telekom)
by
Splunk
One Cisco - Splunk Public Sector Summit Germany April 2025
by
Splunk
.conf Go 2023 - Data analysis as a routine
by
Splunk
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
by
Splunk
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
by
Splunk
.conf Go 2023 - Raiffeisen Bank International
by
Splunk
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
by
Splunk
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
by
Splunk
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
by
Splunk
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
by
Splunk
.conf go 2023 - De NOC a CSIRT (Cellnex)
by
Splunk
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
by
Splunk
Splunk - BMW connects business and IT with data driven operations SRE and O11y
by
Splunk
Recently uploaded
PDF
Fortinet Certified Fundamentals in Cybersecurity
by
VICTOR MAESTRE RAMIREZ
PDF
2026_01_28 - OpenMetadata Community Meeting.pdf
by
OpenMetadata
PDF
How to Design Premium Health (Public Health) PPT Using AI? Top Strategies
by
Public Health Concern Nepal
PDF
Transcript: What Thema can do: Leveraging metadata to support the discoverabi...
by
BookNet Canada
PPTX
API Gateway Architecture - Technical Report 2026
by
Powersoft2026
PDF
How PayPal Account Verification Works – Complete Guide for Online Businesses
by
jhdhj3989
PDF
Transcript: EU regulations for the North American book supply chain - Tech Fo...
by
BookNet Canada
PDF
Computer-Based Training (CBT) The Backbone of Modern Technical & Defence Trai...
by
computerbasedtrainin1
PDF
Adapt.com Seed Fundraising Deck | The AI Computer for Business
by
ashley459565
PDF
Certified AI-Empowered SAFe 6 Scrum Master.pdf
by
Marc Entsminger SPC6, RTE, SSM, SA, SDP
PDF
Bettersize | BeSEC Series Product Brochure
by
Bettersize Instruments
PDF
Getting the Best of TrueDEM – January News & Updates
by
panagenda
PDF
React Mastery: Visual Mental Models to Understand React Deeply
by
Thomas Gaye
PDF
Chapter 3 Cryptography and encryption techniques.pdf
by
Getnet Tigabie Askale -(GM)
PDF
Quick Learn Laravel for Beginner from Zero to Survive
by
iDev Semarang
PDF
Certified AI-Empowered SAFe Release Train Engineer.pdf
by
Marc Entsminger SPC6, RTE, SSM, SA, SDP
PDF
What Thema can do: Leveraging metadata to support the discoverability of Firs...
by
BookNet Canada
PDF
Peculiar Findings Around CEX Activity and ETH Price
by
tobbymnbvcxz
PDF
ICT500 - CRITICAL AND CREATIVE THINKING FOR INFORMATION TECHNOLOGY SOLUTIONS:...
by
2024432452
PDF
A Simple Guide to Real Estate Tokenization on XRP Ledger.pdf
by
emmajoh2025
Fortinet Certified Fundamentals in Cybersecurity
by
VICTOR MAESTRE RAMIREZ
2026_01_28 - OpenMetadata Community Meeting.pdf
by
OpenMetadata
How to Design Premium Health (Public Health) PPT Using AI? Top Strategies
by
Public Health Concern Nepal
Transcript: What Thema can do: Leveraging metadata to support the discoverabi...
by
BookNet Canada
API Gateway Architecture - Technical Report 2026
by
Powersoft2026
How PayPal Account Verification Works – Complete Guide for Online Businesses
by
jhdhj3989
Transcript: EU regulations for the North American book supply chain - Tech Fo...
by
BookNet Canada
Computer-Based Training (CBT) The Backbone of Modern Technical & Defence Trai...
by
computerbasedtrainin1
Adapt.com Seed Fundraising Deck | The AI Computer for Business
by
ashley459565
Certified AI-Empowered SAFe 6 Scrum Master.pdf
by
Marc Entsminger SPC6, RTE, SSM, SA, SDP
Bettersize | BeSEC Series Product Brochure
by
Bettersize Instruments
Getting the Best of TrueDEM – January News & Updates
by
panagenda
React Mastery: Visual Mental Models to Understand React Deeply
by
Thomas Gaye
Chapter 3 Cryptography and encryption techniques.pdf
by
Getnet Tigabie Askale -(GM)
Quick Learn Laravel for Beginner from Zero to Survive
by
iDev Semarang
Certified AI-Empowered SAFe Release Train Engineer.pdf
by
Marc Entsminger SPC6, RTE, SSM, SA, SDP
What Thema can do: Leveraging metadata to support the discoverability of Firs...
by
BookNet Canada
Peculiar Findings Around CEX Activity and ETH Price
by
tobbymnbvcxz
ICT500 - CRITICAL AND CREATIVE THINKING FOR INFORMATION TECHNOLOGY SOLUTIONS:...
by
2024432452
A Simple Guide to Real Estate Tokenization on XRP Ledger.pdf
by
emmajoh2025
Splunk Security Update | Public Sector Summit Germany 2025
1.
© 2025 SPLUNK
INC. Marcel Tanuatmadja
2.
© 2025 SPLUNK
INC. © 2025 SPLUNK LLC
3.
© 2025 SPLUNK
LLC Master the “Mean-Time-To-X” Game (D)etect Mean Time To… Someone breaks in You notice it
4.
© 2025 SPLUNK
INC. © 2025 SPLUNK INC. Find Content (Sec. Use Cases) Top-Down works best 1. Do a Risk assessment – understand your organisations Resiliency needs 2. Engage Stakeholders early in the process 3. Identify and prioritize Use Cases 4. Identify and prioritize Data Sources Top Down
5.
© 2025 SPLUNK
INC. © 2025 SPLUNK INC. Get Data “in” Splunk Data Management (DMX) Filter Normalize Mask Enrich Logs to Metrics Aggregate Public Cloud Private Cloud On Premise Data Lake Splunk Cloud Splunk Enterprise Data Management Experience (DMX) Runs on the Edge and Cloud End to End Monitoring (incl. Agent Management) UF, HEC, OTel Metrics Logs Routing Traces Events Splunk O11y Cloud Amazon S3
6.
© 2025 SPLUNK
INC. © 2025 SPLUNK INC. Come up with a Data Storage and Retention Policy Not all Data is the same Age of Data Forensics, Audit & Compliance <1 sec <1 min <10 sec 1 week 1 year 1 month 1 hour 1 day 10 year Prevention, Detection, Monitoring Incident Review, Investigations, Threat Hunting Real and Near-Real Time Archive Ad Hoc
7.
© 2025 SPLUNK
INC. © 2025 SPLUNK INC. Find Content for your Use Cases Use Vendors Library, Develop it yourself, use Industry Standards… and test it https://github.com/splunk/attack_rang e https://github.com/splunk/attack_rang e
8.
© 2025 SPLUNK
INC. Prioritize Findings With Risk-Based-Alerting (RBA) https://rba.community/
9.
© 2025 SPLUNK
INC. ● Gain visibility into risks associated with LLM models, AI apps and entities. ● Splunk Cisco Security Cloud App Pulls in alerts from AI Defense and maps them to the Common Information Model (CIM), visualized in a dashboard. ● Includes an out-of-the-box Enterprise Security detection that surfaces potential attacks against the AI models running in your environment. Gain visibility into emerging AI Risks
10.
© 2025 SPLUNK
LLC Master the “Mean-Time-To-X” Game (D)etect (I)nvestigate (A)cknowlege Mean Time To… Someone breaks in You notice it You figure out what happened, how it happened and what to do
11.
© 2025 SPLUNK
INC. ● Take the manual work out of threat analysis and integrate into SOC workflows seamlessly ● Ensure a baseline standard of investigation with consistent, comprehensive, and high-quality threat analysis and Verdict Automatic analysis of active threats for contextual insights to accelerate investigations & resolution “Splunk SOAR is able to take the outputs from Splunk Attack Analyzer and update the case management ticket with the results to provide the results of the analysis. This gets the information right where it needs to go – into the analyst’s hands within minutes.” – Sr. Director, Global Security Operations, Splunk Product Web Page -Product Brief - Product Tour
12.
© 2025 SPLUNK
LLC © 2025 SPLUNK LLC You can’t secure, what you can’t see Incomplete and Inaccurate Asset Data 52% manage 10,000+ assets1 Lengthy Security Investigation 69% experienced an attack targeting unknown, or poorly managed assets2 Gaps in compliance $4M average revenue loss due to compliance audit failures3 1 Security Hygiene and Posture Management Survey by ESG, Oct 2021, p.12 2 Security Hygiene and Posture Management Survey by ESG, Oct 2021, p.13 3 Whitepaper: The True Cost of Compliance, Ponemon Institute, Dec 2017, p.12 Product Web Page -Product Brief - Technical Tour
13.
© 2025 SPLUNK
LLC a Splunk Add-on for Talos Intelligence All Splunk ES, SOAR, SAA customers have access Delivers rich enrichment for common IOCs ES SAA SOAR
14.
© 2025 SPLUNK
LLC Master the “Mean-Time-To-X” Game (D)etect (I)nvestigate (A)cknowlege Mean Time To… Someone breaks in You notice it You figure out what happened, how it happened and what to do (C)ontainment You contain the attack
15.
© 2025 SPLUNK
INC. ❖ Improved case management capabilities ❖ Native Splunk® SOAR integration ❖ Enhanced detection engineering capabilities The Market-Leading SIEM to Power the SOC of the Future
16.
© 2025 SPLUNK
LLC © 2025 SPLUNK LLC Guided security workflows where you do your work ❖ Answer analyst questions to guide daily workflows ❖ Save time while addressing threats more rapidly ❖ Use natural language queries to get answers during investigations UI shown is for illustration; not final product.
17.
© 2025 SPLUNK
LLC Master the “Mean-Time-To-X” Game (D)etect (I)nvestigate (A)cknowlege (R)espond / Resolution / Remediate Mean Time To… Someone breaks in You notice it You figure out what happened, how it happened and what to do You fully neutralize the attack You make sure that attack can’t happen again! (C)ontainment You contain the attack
18.
© 2025 SPLUNK
LLC © 2025 SPLUNK LLC Flexible Deployment Models Logs Events Alerts Telemetry Investigation Risk-Based Alerting | Threat Hunting | Integrated Analytics Unified Analyst Experience Workflows | Case Management | Collaboration GenAI for SecOps Summarization | Natural Language Search | Reporting Threat Detection Static | Dynamic (ML) | Pre-Built | Custom | Authoring Response Enrichment | Automation | Orchestration | Playbooks Common Services Assets & Identities | Threat Intelligence | Risk Data Management & Federation Filter | Mask | Route | Access Unified TDIR in a single platform Splunk’s unified TDIR platform approach True Multi Vendor
19.
© 2025 SPLUNK
INC. Splunk Enterprise Security: The Core of the Unified TDIR Experience Unifying Threat Detection, Investigation and Response Federation Search & Analytics Amazon Security Lake Additional Data Lakes Amazon S3 Cisco XDR Real-time attack chain detection Cisco SNA Pervasive Network Detection & Analytics Splunk Enterprise Security SOAR Threat Intelligence Management Mission Control Analytics / Search / Investigation Unified SOC Analyst View Analyst Queue | Findings | Investigations | Case Management Network Traffic & Logs Telemetry & Alerts
20.
© 2025 SPLUNK
LLC © 2025 SPLUNK LLC
Download