SlideShare a Scribd company logo
Copyright	©	2016	Splunk	Inc.
Enterprise	Security	&	
UBA	Overview
SplunkLive 2016
Jon	Harris,	Sr SE	
Security	Splunk	Guy
2
> Jon Harris jonharris@splunk.com
• 6 months at Splunk
• Senior SE (focus on security)
• 15+ years in IT and security
• Worked for leading IT Security vendors
• Software development background
whoami
3
LEGAL	NOTICES
During	the	course	of	this	presentation,	we	may	make	forward-looking	statements	regarding	future	
events	or	the	expected	performance	of	the	company.	We	caution	you	that	such	statements	reflect	our	
current	expectations and estimates based	on	factors	currently	known	to	us	and	that	actual	events	or	
results	could	differ	materially.	For	important	factors	that	may	cause	actual	results	to	differ	from	those	
contained	in	our	forward-looking	statements,	please	review	our	filings with	the	SEC. The	forward-
looking	statements	made	in	this	presentation	are	being	made	as	of	the	time	and	date	of	its	live	
presentation. If reviewed	after its	live	presentation, this	presentation	may	not	contain	current	or	
accurate	information. We	do	not	assume	any	obligation	to	update	any	forward-looking	statements	
we may make. In	addition,	any	information	about	our roadmap	outlines	our	general	product	direction	
and	is	subject	to	change	at	any	time	without	notice.	It is	for	informational	purposes	only	and	shall	
not be	incorporated	into	any	contract	or	other	commitment.	Splunk	undertakes	no	obligation	either	to	
develop	the	features	or	functionality	described or	to	include	any	such	feature	or	functionality	in	a	
future	release.
4
Agenda
Splunk	Security	Update
Enterprise	Security	4.2
User	Behavior	Analytics	2.3
5
Data	Breaches	in	Australia
6
2016	Cost	of	Data	Breach	Study
The	cost	of	a	data	breach	continues	to	rise:	$158	per	record
The	largest	component	of	the	total	cost	of	a	data	breach	is	lost	business
“Time	to	Identify”	and	“Time	to	Contain”	a	data	breach	is	critical	
Average	total	cost	of	data	breach	in	Australia	is	$2.64	million
Key	factor	to	reduce	the	cost	of	a	data	breach	is	enabling	incident	response	
Source: June	2016
7
Advanced	Threats	Are	Hard	to	Find
Cyber	Criminals
Nation	States
Insider	Threats
Source:	Mandiant	M-Trends	Report	2012/2013/2014
100%	
Valid	credentials	were	used
40
Average	#	of	systems	accessed
229
Median	#	of	days	before	detection
67%
Of	victims	were	notified	by	
external	entity
Machine	data	contains	a	definitive	record	
of	all	interactions
Splunk	is	a	very	effective	platform	to	collect,	
store,	and	analyse all	of	that	data
Human Machine
Machine Machine
9
App
Servers
Network
Threat	Intelligence
Firewall
Web	Proxy
Internal	Network	
Security
Endpoints
Splunk	as	the	Security	Nerve	Center
Identity
10
Splunk	Solutions
VMware
Platform	for	Machine	Data
Exchange PCISecurity
Across	Data	Sources,	Use	Cases	and	Consumption	Models
IT	Svc	Int
Splunk	Premium	Solutions Ecosystem	of	Apps
ITSI UBA
UBA
Mainframe
Data
Relational
Databases
MobileForwarders Syslog/TCP IoT
Devices
Network
Wire	Data
Hadoop	
&	NoSQL
11
Splunk	for	Security
DETECTION	 OF	
CYBERATTACKS
INVESTIGATION	
OF	THREATS	AND	
INCIDENTS
OPTIMISED	
INCIDENT	
RESPONSE	 AND	
BREACH	ANALYSIS
DETECTION	 OF	
INSIDER	THREATS
SECURITY	&	
COMPLIANCE	
REPORTING
SPLUNK	UBA SPLUNK	ES
Threat Intelligence Identity and CloudEndpointNetwork
Splunk	Security	Ecosystem
What	is	Splunk	ES?
14
Platform	for	Machine	Data
Splunk	Enterprise	Security
Advancing	analytics-driven	security
Security	and	
Compliance	Reporting
Monitor	and	
Detect
Investigate	Threats	
and	Incidents
Analyze	and	
Optimize	Response
What’s	New
Splunk	Enterprise	Security	v4
16
Attack	and	Investigation	Timelines
Adding	content	to	timeline:
Action History
Actions :
• Search Run
• Dashboard Viewed
• Panel Filtered
• Notable Status Change
• Notable Event
Suppressed
Investigator Memo
Memo :
- Investigator’s memos
inserted in desired timeline
Incident Review
Incident :
- Notable events from
Incident Review
Analyst /
Investigator
17
Prioritise and	Speed	Investigations
Centralised incident	review	combining risk and	
quick	search
Use	the	new	risk	scores	and	quick	searches	to	
determine	the	impact	of	an	incident	quickly
Use	risk	scores	to	generate	actionable	alerts	to	
respond	on	matters	that	require	immediate	
attention.	
ES	4.1
18
Expanded	Threat	Intelligence ES	4.1
Supports	Facebook	ThreatExchange
An	additional	threat	intelligence	
feed	that	provides	following	threat	
indicators	-domain	names,	IPs	and	
hashes
Use	with	ad	hoc	searches	and	
investigations
Extends	Splunk’s Threat	Intelligence	Framework
ES	Demo
What	is	Splunk	UBA?
21
WHAT	IS	THE COMPROMISED	/		MISUSED	
CREDENTIALS	OR	DEVICES
LACK	OF	RESOURCES	
(SECURITY	EXPERTISE)
LACK	OF	ALERT	PRIORITIZATION	&	
EXCESSIVE	FALSE	POSITIVES
PROBLEM?
22
ENTERPRISE SECURITY	OPS	CHALLENGES
THREATS
RESOURCES
EFFICIENCY
External,	Insiders,	Hidden	
And/Or	Unknown
Availability	of	
Security	Expertise
Lack	of	Alert	Prioritisation
&	Excessive	False	Positives
23
Splunk	User	Behavioural Analytics
Automated	Detection	of INSIDER	THREATS	AND	CYBER	ATTACKS
Platform	for	Machine	Data
BehaviourBaselining	
&	Modelling
Unsupervised	
Machine	Learning
Real-Time	&	Big	
Data	Architecture
Threat	&	Anomaly	
Detection
Security	Analytics
24
Splunk	UBA: TECHNOLOGY
ANOMALY	DETECTION THREAT	
DETECTION
UNSUPERVISED	
MACHINE	LEARNING
BEHAVIOUR	
MODELING
REAL	TIME	&	BIG	DATA	
ARCHITECTURE
25
MULTI-ENTITY	BEHAVIOURAL	MODEL
USER	CENTRIC DEVICE	CENTRIC
APPLICATION	 CENTRIC PROTOCOL	CENTRIC
26
MULTI-ENTITY	BEHAVIOURAL	MODEL
APPLICATION
USER
HOST
NETWORK
DATA
27
EVOLUTION
COMPLEXITY
RULES		-THRESHOLD
POLICY		-THRESHOLD
POLICY		-STATISTICS
UNSUPERVISED	
MACHINE	LEARNING
POLICY		-PEER	
GROUP	STATISTICS
SUPERVISED	
MACHINE	LEARNING
LARGEST	LIBRARY	
OF	UNSUPERVISED	ML	ALGORITHMS
28
DESIGNED	FOR	A	
HUNTER
ANALYSTANOMALY	DETECTION
APPLYING	ML	AGAINST	
BEHAVIOUR	BASELINES
29
DESIGNED	FOR	A	
SOC	ANALYST
THREAT	DETECTION
ML-DRIVEN	AUTOMATED	
OR	RULES	BASED
ANOMALY	CORRELATION
30
Web	Gateway
Proxy	Server
Firewall
Box,	Salesforce,	
Dropbox,	other	SaaS	
apps
Mobile	Devices
Anti-Malware
Threat	Intelligence
DATA SOURCES	for	UBA
Active	Directory/
Windows
Single	Sign-on
HR	- Identity
VPN
DNS,	DHCP
Identity/Auth SaaS/MobileSecurity	
Controls
External	Threat	
Feeds
Activity
(N-S,	E-W)
K	E	Y OPTIONAL
DLP
AWS	CloudTrail
Endpoint
IDS,	IPS,	AV
31
Splunk	UBA	and	Splunk	ES	Integration
SIEM,	Hadoop
Firewall,	AD,	DLP
AWS,	VM,	
Cloud,	Mobile
End-point,	
App,	DB	logs
Netflow,	PCAP
Threat	Feeds
DATA	SOURCES
DATA	SCIENCE	DRIVEN	
THREAT	DETECTION
99.99%	EVENT	REDUCTION
UBA
MACHINE	LEARNING	IN	
SIEM	WORKFLOW
ANOMALY-BASED	CORRELATION
101111101010010001000001
111011111011101111101010
010001000001111011111011
What’s	New	in	UBA	2.x
33
Create custom	threats	using	60+
anomalies.	
Create	custom	threat	scenarios	on	top	of	anomalies	
detected	by	machine	learning.	
Helps	with	real-time	threat	detection	and	leverage	to	
detect	threats	on	historical	data.	
Analysts	can	create	many	combinations	and	
permutations	of	threat	detection	scenarios	along	with	
automated	threat	detection.	
Detection	:	Custom	Threat	Modeling	Framework	 UBA	2.2
34
Detection	:		Enhanced	Security	Analytics
Visibility	and	
baseline	metrics	
around	user,	
device,	application	
and	protocol
30+
new	metrics
USER	CENTRIC DEVICE	CENTRIC
APPLICATION	 CENTRIC PROTOCOL	CENTRIC
Detailed	Visibility,	Understand	Normal	Behaviour
UBA	2.2
35
Behavioural Analytics	in	the	SIEM	Workflow
• All	UBA	anomalies	now	available	in	ES
• SOC	Manager:	UBA	Reporting	within	ES
• SOC	analyst:	UBA	anomaly	data	available	for	enhanced	correlation
• Hunter/Investigator:	Ad-hoc	searching/pivoting	
35
Detect	and	Investigate	faster	using	ML	integrated	with	SIEM
36
USER	CENTRIC
Top-N	users	by	number	of	transactions
Top-N	users	by	login/logout	activity
Login/Logout	activity	over	time
Average	daily/weekly/monthly/yearly	login/logout	count
Number	of	failed	logins	(global)
Top-N	users	for	failed	logins
Failed	logins	over	time
Average	daily/weekly/monthly/yearly	failed	login	counts
Top-N	users	by	data	transfer
Average	daily/weekly/monthly/yearly	data	transfer	for	users
Top-N	users	by	session	count
Top-N	users	by	session	length
Average	session	duration	of	users
DEVICE	CENTRIC
APPLICATION	 /	SESSION	CENTRICPROTOCOL	CENTRIC
Top-N	servers	by	activity	(number	of	transactions	)
Top-N	servers	by	login/logout	activity
Top-N	servers	for	failed	logins
Failed	logins	over	time
Top-N	destination	devices	by	data	transfer
Top-N	servers	by	data	transfer
Average	daily/weekly/monthly/yearly	data	
transfer	for	servers
Top-N	source	devices	by	session	count
Total	sessions	count
Total	sessions	count	over	time
Total	sessions	count	by	device-type	(AD,	VPN,	SSH)
Average	sessions	count	daily,	weekly,	monthly,	yearly)
Average	global	session	duration
Average	sessions	duration	over	time	(daily,	weekly,	
monthly	,	yearly)
HTTP	Traffic	by	application-type	(Protocol)
Top-N	domains	by	traffic
Top-N	domains	by	activity	(number	of	events)
Top-N	client	machines	by	traffic
HTTP	traffic	over	time	(day,	week,	month,	year)
Average	daily,	weekly,	monthly,	yearly	http	traffic
UBA	Demo
38
SEPT	26-29,	2016
WALT	DISNEY	WORLD,	ORLANDO
SWAN	AND	DOLPHIN	RESORTS
• 5000+		IT	&	Business	Professionals
• 3	days	of	technical	content
• 165+	sessions	
• 80+	Customer	Speakers
• 35+	Apps	in	Splunk	Apps	Showcase
• 75+	Technology	Partners
• 1:1	networking:	Ask	The	Experts	and	Security	
Experts,	Birds	of	a	Feather	and	Chalk	Talks
• NEW	hands-on	labs!	
• Expanded	show	floor,	Dashboards	Control	
Room	&	Clinic,	and	MORE!	
The	7th Annual	Splunk	Worldwide	Users’	Conference
PLUS	Splunk	University
• Three	days:	Sept	24-26,	2016
• Get	Splunk	Certified	for	FREE!
• Get	CPE credits	for	CISSP,	CAP,	SSCP
• Save	thousands	 on	Splunk	education!
Thank	You!
Appendix
41
DesktopsEmail Web
Threat	
Intelligence
StorageHypervisor
Badges
Mobile
Servers DHCP/	DNS Physical
Access
CMDB
Transaction
Records
Network
Flows
Custom	
Apps
Traditional
Intrusion	
Detection
Data	 Loss	
Prevention
Anti-
Malware
Firewall Vulnerability
Scans
Authentication
All	Data	is	Security	Relevant
Services
Web	
Clickstreams
Cloud
Printers
42
Protect GrowServe
Mission	of	Government
Defend	against	and	
reduce	impact	of	
external	and	insider	
threats
Meet	mission	goals	
through	 operational	
excellence
Ensure	agility	and	scale	
while	embracing	
innovation
43
Challenges:
• Proactive	hunting	of	cyber	adversaries	
• Resource	(analysts)	constraints
• Cumbersome	malware	detection	process
• Myopic	visibility	 into	the	network
Value	Delivered:
• Went	from	reactive	to	proactive
• Made	Tier	1	analysts	immediately	effective
• Holistic	visibility	 across	network
• Bonus:		IT	Operations	troubleshooting
• Validate	security	deployment	decisions
White	House	Military	Office	– From	Hunted	to	Hunter
“Splunk has	helped	us	take	Tier	1	security	
analysts	and	make	them	immediately	effective	
to	defend	our	network.”

More Related Content

What's hot

SplunkLive Melbourne Machine Learning & Analytics
SplunkLive Melbourne Machine Learning & AnalyticsSplunkLive Melbourne Machine Learning & Analytics
SplunkLive Melbourne Machine Learning & Analytics
Gabrielle Knowles
 
SplunkLive Perth Machine Learning & Analytics
SplunkLive Perth Machine Learning & AnalyticsSplunkLive Perth Machine Learning & Analytics
SplunkLive Perth Machine Learning & Analytics
Gabrielle Knowles
 
SplunkLive Brisbane Splunking the Endpoint
SplunkLive Brisbane Splunking the EndpointSplunkLive Brisbane Splunking the Endpoint
SplunkLive Brisbane Splunking the Endpoint
Gabrielle Knowles
 
Enterprise Security featuring UBA
Enterprise Security featuring UBAEnterprise Security featuring UBA
Enterprise Security featuring UBA
Splunk
 
Machine Learning + Analytics in Splunk
Machine Learning + Analytics in SplunkMachine Learning + Analytics in Splunk
Machine Learning + Analytics in Splunk
Splunk
 
SplunkLive DC April 2016 - Operationalizing Machine Learning
SplunkLive DC April 2016 - Operationalizing Machine LearningSplunkLive DC April 2016 - Operationalizing Machine Learning
SplunkLive DC April 2016 - Operationalizing Machine LearningTom LaGatta
 
Machine Learning + Analytics
Machine Learning + AnalyticsMachine Learning + Analytics
Machine Learning + Analytics
Splunk
 
SplunkLive Brisbane Splunk for Operational Security Intelligence
SplunkLive Brisbane Splunk for Operational Security IntelligenceSplunkLive Brisbane Splunk for Operational Security Intelligence
SplunkLive Brisbane Splunk for Operational Security Intelligence
Gabrielle Knowles
 
Machine Learning + Analytics
Machine Learning + AnalyticsMachine Learning + Analytics
Machine Learning + Analytics
Splunk
 
Splunk Webinar: Verwandeln Sie Daten in wertvolle Erkenntnisse - Machine Lear...
Splunk Webinar: Verwandeln Sie Daten in wertvolle Erkenntnisse - Machine Lear...Splunk Webinar: Verwandeln Sie Daten in wertvolle Erkenntnisse - Machine Lear...
Splunk Webinar: Verwandeln Sie Daten in wertvolle Erkenntnisse - Machine Lear...
Georg Knon
 
Splunk Webinar: Mit Splunk SPL Maschinendaten durchsuchen, transformieren und...
Splunk Webinar: Mit Splunk SPL Maschinendaten durchsuchen, transformieren und...Splunk Webinar: Mit Splunk SPL Maschinendaten durchsuchen, transformieren und...
Splunk Webinar: Mit Splunk SPL Maschinendaten durchsuchen, transformieren und...
Georg Knon
 
Deception-Triggered Security Data Science to Detect Adversary Movements
Deception-Triggered Security Data Science to Detect Adversary MovementsDeception-Triggered Security Data Science to Detect Adversary Movements
Deception-Triggered Security Data Science to Detect Adversary Movements
Satnam Singh
 

What's hot (12)

SplunkLive Melbourne Machine Learning & Analytics
SplunkLive Melbourne Machine Learning & AnalyticsSplunkLive Melbourne Machine Learning & Analytics
SplunkLive Melbourne Machine Learning & Analytics
 
SplunkLive Perth Machine Learning & Analytics
SplunkLive Perth Machine Learning & AnalyticsSplunkLive Perth Machine Learning & Analytics
SplunkLive Perth Machine Learning & Analytics
 
SplunkLive Brisbane Splunking the Endpoint
SplunkLive Brisbane Splunking the EndpointSplunkLive Brisbane Splunking the Endpoint
SplunkLive Brisbane Splunking the Endpoint
 
Enterprise Security featuring UBA
Enterprise Security featuring UBAEnterprise Security featuring UBA
Enterprise Security featuring UBA
 
Machine Learning + Analytics in Splunk
Machine Learning + Analytics in SplunkMachine Learning + Analytics in Splunk
Machine Learning + Analytics in Splunk
 
SplunkLive DC April 2016 - Operationalizing Machine Learning
SplunkLive DC April 2016 - Operationalizing Machine LearningSplunkLive DC April 2016 - Operationalizing Machine Learning
SplunkLive DC April 2016 - Operationalizing Machine Learning
 
Machine Learning + Analytics
Machine Learning + AnalyticsMachine Learning + Analytics
Machine Learning + Analytics
 
SplunkLive Brisbane Splunk for Operational Security Intelligence
SplunkLive Brisbane Splunk for Operational Security IntelligenceSplunkLive Brisbane Splunk for Operational Security Intelligence
SplunkLive Brisbane Splunk for Operational Security Intelligence
 
Machine Learning + Analytics
Machine Learning + AnalyticsMachine Learning + Analytics
Machine Learning + Analytics
 
Splunk Webinar: Verwandeln Sie Daten in wertvolle Erkenntnisse - Machine Lear...
Splunk Webinar: Verwandeln Sie Daten in wertvolle Erkenntnisse - Machine Lear...Splunk Webinar: Verwandeln Sie Daten in wertvolle Erkenntnisse - Machine Lear...
Splunk Webinar: Verwandeln Sie Daten in wertvolle Erkenntnisse - Machine Lear...
 
Splunk Webinar: Mit Splunk SPL Maschinendaten durchsuchen, transformieren und...
Splunk Webinar: Mit Splunk SPL Maschinendaten durchsuchen, transformieren und...Splunk Webinar: Mit Splunk SPL Maschinendaten durchsuchen, transformieren und...
Splunk Webinar: Mit Splunk SPL Maschinendaten durchsuchen, transformieren und...
 
Deception-Triggered Security Data Science to Detect Adversary Movements
Deception-Triggered Security Data Science to Detect Adversary MovementsDeception-Triggered Security Data Science to Detect Adversary Movements
Deception-Triggered Security Data Science to Detect Adversary Movements
 

Viewers also liked

Tekninen näkökulma: Lokienhallinta vai SIEM?
Tekninen näkökulma: Lokienhallinta vai SIEM?Tekninen näkökulma: Lokienhallinta vai SIEM?
Tekninen näkökulma: Lokienhallinta vai SIEM?
Nixu Corporation
 
Webinar Express: What is a CASB?
Webinar Express: What is a CASB?Webinar Express: What is a CASB?
Webinar Express: What is a CASB?
Bitglass
 
SplunkLive Canberra Enterprise Security and User Behaviour Analytics
SplunkLive Canberra Enterprise Security and User Behaviour AnalyticsSplunkLive Canberra Enterprise Security and User Behaviour Analytics
SplunkLive Canberra Enterprise Security and User Behaviour Analytics
Splunk
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security Menace
Bitglass
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk
 
User and entity behavior analytics: building an effective solution
User and entity behavior analytics: building an effective solutionUser and entity behavior analytics: building an effective solution
User and entity behavior analytics: building an effective solution
Yolanta Beresna
 
A business level introduction to Artificial Intelligence - Louis Dorard @ PAP...
A business level introduction to Artificial Intelligence - Louis Dorard @ PAP...A business level introduction to Artificial Intelligence - Louis Dorard @ PAP...
A business level introduction to Artificial Intelligence - Louis Dorard @ PAP...
PAPIs.io
 
Stop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with  Integrated CASB & IDaaS SecurityStop Hackers with  Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS Security
OneLogin
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM
AlienVault
 
Jisheng Wang at AI Frontiers: Deep Learning in Security
Jisheng Wang at AI Frontiers: Deep Learning in SecurityJisheng Wang at AI Frontiers: Deep Learning in Security
Jisheng Wang at AI Frontiers: Deep Learning in Security
AI Frontiers
 
Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017
Den Reymer
 

Viewers also liked (12)

Tekninen näkökulma: Lokienhallinta vai SIEM?
Tekninen näkökulma: Lokienhallinta vai SIEM?Tekninen näkökulma: Lokienhallinta vai SIEM?
Tekninen näkökulma: Lokienhallinta vai SIEM?
 
Webinar Express: What is a CASB?
Webinar Express: What is a CASB?Webinar Express: What is a CASB?
Webinar Express: What is a CASB?
 
SplunkLive Canberra Enterprise Security and User Behaviour Analytics
SplunkLive Canberra Enterprise Security and User Behaviour AnalyticsSplunkLive Canberra Enterprise Security and User Behaviour Analytics
SplunkLive Canberra Enterprise Security and User Behaviour Analytics
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security Menace
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
 
User and entity behavior analytics: building an effective solution
User and entity behavior analytics: building an effective solutionUser and entity behavior analytics: building an effective solution
User and entity behavior analytics: building an effective solution
 
A business level introduction to Artificial Intelligence - Louis Dorard @ PAP...
A business level introduction to Artificial Intelligence - Louis Dorard @ PAP...A business level introduction to Artificial Intelligence - Louis Dorard @ PAP...
A business level introduction to Artificial Intelligence - Louis Dorard @ PAP...
 
Stop Hackers with Integrated CASB & IDaaS Security
Stop Hackers with  Integrated CASB & IDaaS SecurityStop Hackers with  Integrated CASB & IDaaS Security
Stop Hackers with Integrated CASB & IDaaS Security
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM
 
Sakaguti 27,mar.2017 casb seminar
Sakaguti 27,mar.2017 casb seminarSakaguti 27,mar.2017 casb seminar
Sakaguti 27,mar.2017 casb seminar
 
Jisheng Wang at AI Frontiers: Deep Learning in Security
Jisheng Wang at AI Frontiers: Deep Learning in SecurityJisheng Wang at AI Frontiers: Deep Learning in Security
Jisheng Wang at AI Frontiers: Deep Learning in Security
 
Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017
 

Similar to SplunkLive Perth Enterprise Security & User Behavior Analytics

SplunkLive Melbourne Enterprise Security & User Behaviour Analytics
SplunkLive Melbourne Enterprise Security & User Behaviour Analytics SplunkLive Melbourne Enterprise Security & User Behaviour Analytics
SplunkLive Melbourne Enterprise Security & User Behaviour Analytics
Splunk
 
Webinar: Splunk Enterprise Security Deep Dive: Analytics
Webinar: Splunk Enterprise Security Deep Dive: AnalyticsWebinar: Splunk Enterprise Security Deep Dive: Analytics
Webinar: Splunk Enterprise Security Deep Dive: Analytics
Splunk
 
SplunkLive Melbourne Machine Learning & Analytics
SplunkLive Melbourne Machine Learning & AnalyticsSplunkLive Melbourne Machine Learning & Analytics
SplunkLive Melbourne Machine Learning & Analytics
Splunk
 
SplunkLive Sydney Machine Learning & Analytics
SplunkLive Sydney Machine Learning & AnalyticsSplunkLive Sydney Machine Learning & Analytics
SplunkLive Sydney Machine Learning & Analytics
Gabrielle Knowles
 
SplunkLive Canberra Machine Learning & Analytics
SplunkLive Canberra Machine Learning & AnalyticsSplunkLive Canberra Machine Learning & Analytics
SplunkLive Canberra Machine Learning & Analytics
Splunk
 
SplunkLive Perth Machine Learning & Analytics
SplunkLive Perth Machine Learning & AnalyticsSplunkLive Perth Machine Learning & Analytics
SplunkLive Perth Machine Learning & Analytics
Splunk
 
SplunkLive Sydney Enterprise Security & User Behaviour Analytics
SplunkLive Sydney Enterprise Security & User Behaviour AnalyticsSplunkLive Sydney Enterprise Security & User Behaviour Analytics
SplunkLive Sydney Enterprise Security & User Behaviour Analytics
Splunk
 
Splunk Enterprise for InfoSec Hands-On
Splunk Enterprise for InfoSec Hands-OnSplunk Enterprise for InfoSec Hands-On
Splunk Enterprise for InfoSec Hands-On
Splunk
 
Splunk Enterprise for IT Troubleshooting Hands-On
Splunk Enterprise for IT Troubleshooting Hands-OnSplunk Enterprise for IT Troubleshooting Hands-On
Splunk Enterprise for IT Troubleshooting Hands-On
Splunk
 
SplunkLive! Warsaw 2016 - Machine Learning
SplunkLive! Warsaw 2016 - Machine LearningSplunkLive! Warsaw 2016 - Machine Learning
SplunkLive! Warsaw 2016 - Machine Learning
Splunk
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk Enterprise
Splunk
 
Getting Started with Splunk Enterprise
Getting Started with Splunk Enterprise Getting Started with Splunk Enterprise
Getting Started with Splunk Enterprise
Splunk
 
Experian Customer Presentation
Experian Customer PresentationExperian Customer Presentation
Experian Customer Presentation
Splunk
 
SplunkLive! London Enterprise Security & UBA
SplunkLive! London Enterprise Security & UBASplunkLive! London Enterprise Security & UBA
SplunkLive! London Enterprise Security & UBA
Splunk
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk Enterprise
Splunk
 
SplunkLive Brisbane Splunk for Operational Security Intelligence
SplunkLive Brisbane Splunk for Operational Security IntelligenceSplunkLive Brisbane Splunk for Operational Security Intelligence
SplunkLive Brisbane Splunk for Operational Security Intelligence
Splunk
 
Getting Started with Splunk Hands-on
Getting Started with Splunk Hands-onGetting Started with Splunk Hands-on
Getting Started with Splunk Hands-on
Splunk
 
Getting Started with Splunk Hands-on
Getting Started with Splunk Hands-onGetting Started with Splunk Hands-on
Getting Started with Splunk Hands-on
Shannon Cuthbertson
 
Building an Analytics Enables SOC
Building an Analytics Enables SOCBuilding an Analytics Enables SOC
Building an Analytics Enables SOC
Splunk
 
5 Ways to Improve your Security Posture with Splunk Enterprise Security
5 Ways to Improve your Security Posture with Splunk Enterprise Security5 Ways to Improve your Security Posture with Splunk Enterprise Security
5 Ways to Improve your Security Posture with Splunk Enterprise Security
Splunk
 

Similar to SplunkLive Perth Enterprise Security & User Behavior Analytics (20)

SplunkLive Melbourne Enterprise Security & User Behaviour Analytics
SplunkLive Melbourne Enterprise Security & User Behaviour Analytics SplunkLive Melbourne Enterprise Security & User Behaviour Analytics
SplunkLive Melbourne Enterprise Security & User Behaviour Analytics
 
Webinar: Splunk Enterprise Security Deep Dive: Analytics
Webinar: Splunk Enterprise Security Deep Dive: AnalyticsWebinar: Splunk Enterprise Security Deep Dive: Analytics
Webinar: Splunk Enterprise Security Deep Dive: Analytics
 
SplunkLive Melbourne Machine Learning & Analytics
SplunkLive Melbourne Machine Learning & AnalyticsSplunkLive Melbourne Machine Learning & Analytics
SplunkLive Melbourne Machine Learning & Analytics
 
SplunkLive Sydney Machine Learning & Analytics
SplunkLive Sydney Machine Learning & AnalyticsSplunkLive Sydney Machine Learning & Analytics
SplunkLive Sydney Machine Learning & Analytics
 
SplunkLive Canberra Machine Learning & Analytics
SplunkLive Canberra Machine Learning & AnalyticsSplunkLive Canberra Machine Learning & Analytics
SplunkLive Canberra Machine Learning & Analytics
 
SplunkLive Perth Machine Learning & Analytics
SplunkLive Perth Machine Learning & AnalyticsSplunkLive Perth Machine Learning & Analytics
SplunkLive Perth Machine Learning & Analytics
 
SplunkLive Sydney Enterprise Security & User Behaviour Analytics
SplunkLive Sydney Enterprise Security & User Behaviour AnalyticsSplunkLive Sydney Enterprise Security & User Behaviour Analytics
SplunkLive Sydney Enterprise Security & User Behaviour Analytics
 
Splunk Enterprise for InfoSec Hands-On
Splunk Enterprise for InfoSec Hands-OnSplunk Enterprise for InfoSec Hands-On
Splunk Enterprise for InfoSec Hands-On
 
Splunk Enterprise for IT Troubleshooting Hands-On
Splunk Enterprise for IT Troubleshooting Hands-OnSplunk Enterprise for IT Troubleshooting Hands-On
Splunk Enterprise for IT Troubleshooting Hands-On
 
SplunkLive! Warsaw 2016 - Machine Learning
SplunkLive! Warsaw 2016 - Machine LearningSplunkLive! Warsaw 2016 - Machine Learning
SplunkLive! Warsaw 2016 - Machine Learning
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk Enterprise
 
Getting Started with Splunk Enterprise
Getting Started with Splunk Enterprise Getting Started with Splunk Enterprise
Getting Started with Splunk Enterprise
 
Experian Customer Presentation
Experian Customer PresentationExperian Customer Presentation
Experian Customer Presentation
 
SplunkLive! London Enterprise Security & UBA
SplunkLive! London Enterprise Security & UBASplunkLive! London Enterprise Security & UBA
SplunkLive! London Enterprise Security & UBA
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk Enterprise
 
SplunkLive Brisbane Splunk for Operational Security Intelligence
SplunkLive Brisbane Splunk for Operational Security IntelligenceSplunkLive Brisbane Splunk for Operational Security Intelligence
SplunkLive Brisbane Splunk for Operational Security Intelligence
 
Getting Started with Splunk Hands-on
Getting Started with Splunk Hands-onGetting Started with Splunk Hands-on
Getting Started with Splunk Hands-on
 
Getting Started with Splunk Hands-on
Getting Started with Splunk Hands-onGetting Started with Splunk Hands-on
Getting Started with Splunk Hands-on
 
Building an Analytics Enables SOC
Building an Analytics Enables SOCBuilding an Analytics Enables SOC
Building an Analytics Enables SOC
 
5 Ways to Improve your Security Posture with Splunk Enterprise Security
5 Ways to Improve your Security Posture with Splunk Enterprise Security5 Ways to Improve your Security Posture with Splunk Enterprise Security
5 Ways to Improve your Security Posture with Splunk Enterprise Security
 

More from Gabrielle Knowles

SplunkLive Sydney Scaling and best practice for Splunk on premise and in the ...
SplunkLive Sydney Scaling and best practice for Splunk on premise and in the ...SplunkLive Sydney Scaling and best practice for Splunk on premise and in the ...
SplunkLive Sydney Scaling and best practice for Splunk on premise and in the ...
Gabrielle Knowles
 
SplunkLive Melbourne Splunk for Developers
SplunkLive Melbourne Splunk for DevelopersSplunkLive Melbourne Splunk for Developers
SplunkLive Melbourne Splunk for Developers
Gabrielle Knowles
 
SplunkLive Melbourne Scaling and best practice for Splunk on premise and in t...
SplunkLive Melbourne Scaling and best practice for Splunk on premise and in t...SplunkLive Melbourne Scaling and best practice for Splunk on premise and in t...
SplunkLive Melbourne Scaling and best practice for Splunk on premise and in t...
Gabrielle Knowles
 
SplunkLive Brisbane Getting Started with IT Service Intelligence
SplunkLive Brisbane Getting Started with IT Service IntelligenceSplunkLive Brisbane Getting Started with IT Service Intelligence
SplunkLive Brisbane Getting Started with IT Service Intelligence
Gabrielle Knowles
 
SplunkLive Brisbane Splunk for Developers
SplunkLive Brisbane Splunk for DevelopersSplunkLive Brisbane Splunk for Developers
SplunkLive Brisbane Splunk for Developers
Gabrielle Knowles
 
SplunkLive Canberra Getting Started with IT Service Intelligence
SplunkLive Canberra Getting Started with IT Service IntelligenceSplunkLive Canberra Getting Started with IT Service Intelligence
SplunkLive Canberra Getting Started with IT Service Intelligence
Gabrielle Knowles
 
Getting Started with Splunk
Getting Started with SplunkGetting Started with Splunk
Getting Started with Splunk
Gabrielle Knowles
 
Customer Presentation - Student Job Search
Customer Presentation - Student Job SearchCustomer Presentation - Student Job Search
Customer Presentation - Student Job Search
Gabrielle Knowles
 
Delivering New Visibility and Analytics for IT Operations
Delivering New Visibility and Analytics for IT OperationsDelivering New Visibility and Analytics for IT Operations
Delivering New Visibility and Analytics for IT Operations
Gabrielle Knowles
 
Splunk for Security
Splunk for SecuritySplunk for Security
Splunk for Security
Gabrielle Knowles
 
New Features, Pivot and Search Dojo
New Features, Pivot and Search DojoNew Features, Pivot and Search Dojo
New Features, Pivot and Search Dojo
Gabrielle Knowles
 

More from Gabrielle Knowles (11)

SplunkLive Sydney Scaling and best practice for Splunk on premise and in the ...
SplunkLive Sydney Scaling and best practice for Splunk on premise and in the ...SplunkLive Sydney Scaling and best practice for Splunk on premise and in the ...
SplunkLive Sydney Scaling and best practice for Splunk on premise and in the ...
 
SplunkLive Melbourne Splunk for Developers
SplunkLive Melbourne Splunk for DevelopersSplunkLive Melbourne Splunk for Developers
SplunkLive Melbourne Splunk for Developers
 
SplunkLive Melbourne Scaling and best practice for Splunk on premise and in t...
SplunkLive Melbourne Scaling and best practice for Splunk on premise and in t...SplunkLive Melbourne Scaling and best practice for Splunk on premise and in t...
SplunkLive Melbourne Scaling and best practice for Splunk on premise and in t...
 
SplunkLive Brisbane Getting Started with IT Service Intelligence
SplunkLive Brisbane Getting Started with IT Service IntelligenceSplunkLive Brisbane Getting Started with IT Service Intelligence
SplunkLive Brisbane Getting Started with IT Service Intelligence
 
SplunkLive Brisbane Splunk for Developers
SplunkLive Brisbane Splunk for DevelopersSplunkLive Brisbane Splunk for Developers
SplunkLive Brisbane Splunk for Developers
 
SplunkLive Canberra Getting Started with IT Service Intelligence
SplunkLive Canberra Getting Started with IT Service IntelligenceSplunkLive Canberra Getting Started with IT Service Intelligence
SplunkLive Canberra Getting Started with IT Service Intelligence
 
Getting Started with Splunk
Getting Started with SplunkGetting Started with Splunk
Getting Started with Splunk
 
Customer Presentation - Student Job Search
Customer Presentation - Student Job SearchCustomer Presentation - Student Job Search
Customer Presentation - Student Job Search
 
Delivering New Visibility and Analytics for IT Operations
Delivering New Visibility and Analytics for IT OperationsDelivering New Visibility and Analytics for IT Operations
Delivering New Visibility and Analytics for IT Operations
 
Splunk for Security
Splunk for SecuritySplunk for Security
Splunk for Security
 
New Features, Pivot and Search Dojo
New Features, Pivot and Search DojoNew Features, Pivot and Search Dojo
New Features, Pivot and Search Dojo
 

Recently uploaded

一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单
ewymefz
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
slg6lamcq
 
Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
TravisMalana
 
一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单
enxupq
 
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
pchutichetpong
 
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
Tiktokethiodaily
 
The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...
jerlynmaetalle
 
社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .
NABLAS株式会社
 
FP Growth Algorithm and its Applications
FP Growth Algorithm and its ApplicationsFP Growth Algorithm and its Applications
FP Growth Algorithm and its Applications
MaleehaSheikh2
 
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdfCh03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
haila53
 
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
axoqas
 
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
u86oixdj
 
一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单
enxupq
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
slg6lamcq
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
ewymefz
 
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdfSample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Linda486226
 
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
yhkoc
 
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
ewymefz
 
standardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhstandardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghh
ArpitMalhotra16
 

Recently uploaded (20)

一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
 
Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)Malana- Gimlet Market Analysis (Portfolio 2)
Malana- Gimlet Market Analysis (Portfolio 2)
 
一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单
 
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
Data Centers - Striving Within A Narrow Range - Research Report - MCG - May 2...
 
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
 
The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...The affect of service quality and online reviews on customer loyalty in the E...
The affect of service quality and online reviews on customer loyalty in the E...
 
社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .社内勉強会資料_LLM Agents                              .
社内勉強会資料_LLM Agents                              .
 
FP Growth Algorithm and its Applications
FP Growth Algorithm and its ApplicationsFP Growth Algorithm and its Applications
FP Growth Algorithm and its Applications
 
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdfCh03-Managing the Object-Oriented Information Systems Project a.pdf
Ch03-Managing the Object-Oriented Information Systems Project a.pdf
 
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
哪里卖(usq毕业证书)南昆士兰大学毕业证研究生文凭证书托福证书原版一模一样
 
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
原版制作(Deakin毕业证书)迪肯大学毕业证学位证一模一样
 
一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
 
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdfSample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
Sample_Global Non-invasive Prenatal Testing (NIPT) Market, 2019-2030.pdf
 
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
一比一原版(CU毕业证)卡尔顿大学毕业证成绩单
 
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
 
standardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghhstandardisation of garbhpala offhgfffghh
standardisation of garbhpala offhgfffghh
 

SplunkLive Perth Enterprise Security & User Behavior Analytics