Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Learn to implement Splunk Enterprise. Configure, maintain, and support Splunk operations. This course is part of a 3-course Splunk Enterprise administration series.
Learn to ingest data into Splunk Enterprise. Configure data inputs: files, network, scripted, and HTTP Event Collector. Make your Splunk deployment valuable with complete data.
Learn Splunk parsing and data management. Mask, reroute, and transform data. Build on your Splunk Enterprise administration skills.
Learn Splunk Enterprise administration fundamentals. Configure data inputs, manage users, optimize search, and troubleshoot issues. Maximize the value of Splunk for your organization.
Lance Moraitis-Jones from Recorded Future delves into automated threat profiling implementation, exploring dynamic prioritization methods and practical strategies for enhancing organizational security.
Richard Meeus of Akamai shares how comprehensive visibility across IT infrastructure, data streams and applications strengthens organizational defenses and ensures robust operational resilience.
Dr. Durga Prasad Dube of Reliance Industries explores behavior-based threat detection approaches and SIEM modernization strategies.
WSP's Christopher Johnson examines the evolution of OT-focused security operations centers, highlighting critical differences from traditional IT SOCs.
Steve Jackson of Binalyze demonstrates how automation can revolutionize SOC operations, addressing key challenges in operational security, resource management and regulatory compliance in today's "assume breach" landscape.
Learn about cutting edge trends in AI-Powered SOCs today!
Trend Micro's senior threat researcher Nitesh Surana reveals critical vulnerabilities in Azure Machine Learning services, demonstrating how attackers can compromise ML workspaces.
Steven Wallstedt, Vlad Brodsky and Bino Gopal discuss real-world applications and challenges of generative AI in financial services security.
Industry experts Gary Meshell and John Gutkowski explore how financial institutions can integrate AI and cyber mesh architecture to enhance threat detection and improve security resilience.