Splunk Bite-Size Security — Enterprise Security Webinar Series

How to enhance enterprise security with insights on case management, assets, identities, risk-based alerting, and threat intelligence in our Splunk Bite-Size Security Series.

splunk logo

About the Series

In this fast-paced digital era, organisations face a myriad of complex security challenges. Staying ahead of the curve requires not only an understanding of the latest security trends and technologies but also practical guidance on how to leverage them effectively.

That's where our Splunk Bite-Size Security Series comes in. Our series of 30-minute webinars will take you on a journey through the key aspects of enterprise security, providing you with actionable insights that can be immediately applied to your security operations.

From uncovering the inner workings of case management in Splunk Enterprise Security to establishing a strong foundation with assets and identities, and from leveraging risk-based alerting to harnessing the power of threat intelligence, each webinar delves deep into a critical aspect of modern security operations.

Meet the Experts

Agenda and Further Information

Webinar #1: Case Management Under the Hood with Splunk Enterprise Security — Recording Available Below
Hosted by Stew Lowe, Splunk Security Expert CISSP

— "Examining the powerful case management capabilities of Splunk Enterprise Security".

> Explore Splunk Enterprise Security's powerful case management capabilities
> Learn efficient incident response and investigation workflows
> Utilise automation and orchestration for faster response times
> Real-world use cases showcasing the benefits of Splunk's case management features
Webinar #2: Assets and Identities: The Bedrock of Enterprise Security
— Recording Available Below
Hosted by Ben Marrable, Senior Security Strategist CISSP at Somerford

— "Delving into the importance of assets and identities in building a solid foundation for enterprise security".

> Gain comprehensive visibility into your organisation's digital assets
> Manage and monitor identities for secure access controls
> Identify and mitigate risks related to unauthorised access
> Real-world examples demonstrating the impact of robust asset and identity management
Webinar #3: Risk-Based Alerting: The Frontier of Enterprise Security
— Recording Available Below
Hosted by Ben Marrable, Senior Security Strategist CISSP at Somerford

— "Exploring the world of risk-based alerting and its role in modern enterprise security".

> Prioritise security events based on impact and likelihood
> Implement risk scoring mechanisms for actionable alerts
> Integrate risk-based alerting into existing security operations
> Real-world examples highlighting the effectiveness of risk-based alerting
Webinar #4: Threat Intelligence: The Intellect of Enterprise Security
— Recording Available Below
Hosted by Stew Lowe, Splunk Security Expert CISSP

— "Unlocking the power of threat intelligence and its vital role in safeguarding your organisation".

> Understand the importance of threat intelligence in proactive threat detection
> Leverage threat intelligence data to enhance threat detection and response
> Integrate threat intelligence feeds for real-time analysis
> Real-world scenarios showcasing the value of threat intelligence in staying ahead of cyber threats

Have any Questions?

Feel free to reach out to us with any questions you have about our webinar series.

Scroll to Top