A Journey Through Security Maturity — Splunk Webinar Series

Navigating you through the Stages of Splunk's Security Maturity Model.

splunk logo

Setting the Scene

In today's constantly changing threat landscape, it is essential for organisations to regularly evaluate and enhance their security posture.

Whether you are starting out on your journey or joining as a seasoned pro, our dedicated webinar series will give you a unique insight into Splunk's approach to security maturity.

Explore how it can help improve your organisation's security posture, what data should be prioritised and what best steps your organisation should take to ensure systematic security maturity.

Meet the Experts

Ben Marrable,
Security Strategist (CISSP) at Somerford

Stew Lowe,
Splunk Security Technical Consultant
at Somerford

About the Series

Webinar #1: Years 1-2 of Security Operations, What to do with SecOps? (Ft. Splunk Security Essentials)
Hosted by Somerford's Ben Marrable

> Introduction: The importance of security maturity mapping and how Splunk can help
> The Splunk Security Maturity Model: Overview of years 1 and 2 of security operations, and examining stages of security maturity
> How to use Splunk to assess your organisation's current security posture to utilise best practices and strategies
> Where Splunk's security portfolio fits across the maturity model - Ft. Splunk Security Essentials
Webinar #2: Years 3-4 of Security Operations, Enabling Monitoring & Alerting (Ft. Splunk RBA)
Hosted by Somerford's Ben Marrable

> Introduction: The importance of security maturity mapping and how Splunk can help
> The Splunk Security Maturity Model: Overview of years 2 and 3 of security operations, and examining stages of security maturity
> How to use Splunk to assess your organisation's current security posture to utilise best practices and strategies
> Where Splunk's security portfolio fits across the maturity model - Ft. Splunk Risk-Based Alerting (RBA)
Webinar #3: Years 5+ of Security Operations, Achieving Real-Time Automation (Ft. Splunk SOAR)
Hosted by Somerford's Stew Lowe

> Introduction: The importance of security maturity mapping and how Splunk can help
> The Splunk Security Maturity Model: Overview of years 3 and 4 of security operations, and examining stages of security maturity
> How to use Splunk to assess your organisation's current security posture to utilise best practices and strategies
> Where Splunk's security portfolio fits across the maturity model - Ft. Splunk Security, Operation, Automation and Response (SOAR)

Have any Questions?

Feel free to reach out to us with any questions you have about our webinar series.

Scroll to Top