filmov
tv
Advanced Threat Hunting and Anomaly Detection with Splunk UBA

Показать описание
Splunk User Behavior Analytics (UBA) contains the largest library of unsupervised machine learning in the market. In this session, we'll show how to analyze data from both cloud and on-premises data sources in both types of deployment (cloud/on-premises) to convey the unique benefits of Splunk UBA. We'll discuss real-world examples that showcase the importance of using UBA and all other tools at your disposal for day-to-day threat hunting. Specifically, we'll show how to use Splunk Enterprise, Splunk Enterprise Security, and Splunk UBA together to hunt and detect anomalies that can reveal significant threats. We'll wrap up with best and worst practices from deployments seen throughout the world.
From .conf19, session SEC1248
Special thanks and credit to Tom Smit, Staff Sales Engineer, Splunk
From .conf19, session SEC1248
Special thanks and credit to Tom Smit, Staff Sales Engineer, Splunk
Advanced Threat Hunting and Anomaly Detection with Splunk UBA
How To Threat hunt Like A Pro: The Easy Way
Cybersecurity Threat Hunting Explained
Data Anomaly Driven Web Threat Hunting
Azure ATP Demo: Identity Threat Hunting
Threat Hunting for VPN Anomalies
Getting started with Threat Hunting in Microsoft Sentinel
Advanced Threat Detection with UEBA & Anomaly Detection Based on MITRE ATT&CK Framework in W...
Advanced threat detection with Cisco Stealthwatch - using anomaly detection
Common misconceptions and mistakes made in Threat Hunting
Leveraging User Behavior for Cyber Threat Hunting
Keynote: Threat Hunting: Old Data, New Tricks!
Managed Detection and Response: Threat Hunting
Threat Hunting with Network Flow - SANS Threat Hunting Summit 2017
Cisco Security HOWTO: Threat Hunting
At Scale Anomaly Detection for Enterprise Security: Joshua Neil, Microsoft
Threat Hunting via Sysmon - SANS Blue Team Summit
My “Aha!” Moment - Methods, Tips, & Lessons Learned in Threat Hunting - SANS THIR Summit 2019...
which side are you on? 🇮🇱/🇵🇸 #israel #freepalestine #idf #shortsvideo
Threat Hunting on the Cheap: Threat Hunting Summit 2016
Wireshark and Recognizing Exploits, HakTip 138
Practical Threat Hunting With Machine Learning
Microsoft 365 Defender webinar: Advanced hunting in Microsoft 365 Defender
Building a Hunting Program at a Global Scale | 2020 Threat Hunting & Incident Response Summit
Комментарии