beyond the splunk app for enterprise security
DESCRIPTION
We all know that Splunk goes beyond the capabilities of a traditional SIEM. This presentation will go beyond the Splunk App for Enterprise Security to look at data types that are not usually thought of as “security relevant.” Big data comes in many forms and we’ll show through examples how this applies to the discipline of security.TRANSCRIPT
![Page 1: Beyond The Splunk App for Enterprise Security](https://reader033.vdocuments.mx/reader033/viewer/2022061301/54dae4254a7959b6618b46f2/html5/thumbnails/1.jpg)
![Page 2: Beyond The Splunk App for Enterprise Security](https://reader033.vdocuments.mx/reader033/viewer/2022061301/54dae4254a7959b6618b46f2/html5/thumbnails/2.jpg)
![Page 3: Beyond The Splunk App for Enterprise Security](https://reader033.vdocuments.mx/reader033/viewer/2022061301/54dae4254a7959b6618b46f2/html5/thumbnails/3.jpg)
![Page 4: Beyond The Splunk App for Enterprise Security](https://reader033.vdocuments.mx/reader033/viewer/2022061301/54dae4254a7959b6618b46f2/html5/thumbnails/4.jpg)
![Page 5: Beyond The Splunk App for Enterprise Security](https://reader033.vdocuments.mx/reader033/viewer/2022061301/54dae4254a7959b6618b46f2/html5/thumbnails/5.jpg)
![Page 6: Beyond The Splunk App for Enterprise Security](https://reader033.vdocuments.mx/reader033/viewer/2022061301/54dae4254a7959b6618b46f2/html5/thumbnails/6.jpg)
![Page 7: Beyond The Splunk App for Enterprise Security](https://reader033.vdocuments.mx/reader033/viewer/2022061301/54dae4254a7959b6618b46f2/html5/thumbnails/7.jpg)
![Page 8: Beyond The Splunk App for Enterprise Security](https://reader033.vdocuments.mx/reader033/viewer/2022061301/54dae4254a7959b6618b46f2/html5/thumbnails/8.jpg)
![Page 9: Beyond The Splunk App for Enterprise Security](https://reader033.vdocuments.mx/reader033/viewer/2022061301/54dae4254a7959b6618b46f2/html5/thumbnails/9.jpg)
![Page 10: Beyond The Splunk App for Enterprise Security](https://reader033.vdocuments.mx/reader033/viewer/2022061301/54dae4254a7959b6618b46f2/html5/thumbnails/10.jpg)
![Page 11: Beyond The Splunk App for Enterprise Security](https://reader033.vdocuments.mx/reader033/viewer/2022061301/54dae4254a7959b6618b46f2/html5/thumbnails/11.jpg)
![Page 12: Beyond The Splunk App for Enterprise Security](https://reader033.vdocuments.mx/reader033/viewer/2022061301/54dae4254a7959b6618b46f2/html5/thumbnails/12.jpg)
![Page 13: Beyond The Splunk App for Enterprise Security](https://reader033.vdocuments.mx/reader033/viewer/2022061301/54dae4254a7959b6618b46f2/html5/thumbnails/13.jpg)
![Page 14: Beyond The Splunk App for Enterprise Security](https://reader033.vdocuments.mx/reader033/viewer/2022061301/54dae4254a7959b6618b46f2/html5/thumbnails/14.jpg)
![Page 15: Beyond The Splunk App for Enterprise Security](https://reader033.vdocuments.mx/reader033/viewer/2022061301/54dae4254a7959b6618b46f2/html5/thumbnails/15.jpg)
![Page 16: Beyond The Splunk App for Enterprise Security](https://reader033.vdocuments.mx/reader033/viewer/2022061301/54dae4254a7959b6618b46f2/html5/thumbnails/16.jpg)
![Page 17: Beyond The Splunk App for Enterprise Security](https://reader033.vdocuments.mx/reader033/viewer/2022061301/54dae4254a7959b6618b46f2/html5/thumbnails/17.jpg)
![Page 18: Beyond The Splunk App for Enterprise Security](https://reader033.vdocuments.mx/reader033/viewer/2022061301/54dae4254a7959b6618b46f2/html5/thumbnails/18.jpg)
![Page 19: Beyond The Splunk App for Enterprise Security](https://reader033.vdocuments.mx/reader033/viewer/2022061301/54dae4254a7959b6618b46f2/html5/thumbnails/19.jpg)
![Page 20: Beyond The Splunk App for Enterprise Security](https://reader033.vdocuments.mx/reader033/viewer/2022061301/54dae4254a7959b6618b46f2/html5/thumbnails/20.jpg)
![Page 21: Beyond The Splunk App for Enterprise Security](https://reader033.vdocuments.mx/reader033/viewer/2022061301/54dae4254a7959b6618b46f2/html5/thumbnails/21.jpg)
![Page 22: Beyond The Splunk App for Enterprise Security](https://reader033.vdocuments.mx/reader033/viewer/2022061301/54dae4254a7959b6618b46f2/html5/thumbnails/22.jpg)
![Page 23: Beyond The Splunk App for Enterprise Security](https://reader033.vdocuments.mx/reader033/viewer/2022061301/54dae4254a7959b6618b46f2/html5/thumbnails/23.jpg)
![Page 24: Beyond The Splunk App for Enterprise Security](https://reader033.vdocuments.mx/reader033/viewer/2022061301/54dae4254a7959b6618b46f2/html5/thumbnails/24.jpg)
![Page 25: Beyond The Splunk App for Enterprise Security](https://reader033.vdocuments.mx/reader033/viewer/2022061301/54dae4254a7959b6618b46f2/html5/thumbnails/25.jpg)
![Page 26: Beyond The Splunk App for Enterprise Security](https://reader033.vdocuments.mx/reader033/viewer/2022061301/54dae4254a7959b6618b46f2/html5/thumbnails/26.jpg)
![Page 27: Beyond The Splunk App for Enterprise Security](https://reader033.vdocuments.mx/reader033/viewer/2022061301/54dae4254a7959b6618b46f2/html5/thumbnails/27.jpg)