Security orchestration and automation with Splunk
Learn how to strengthen your security operations and incident response capabilities with Splunk and Phantom
It's that time of the year again – its mnemonic’s annual Christmas breakfast seminar!
The present(-ations) at this year's Christmas breakfast seminar will take you through real examples of how we in mnemonic use Splunk for incident response and threat hunting, and introduce the newest addition to the Splunk family – Phantom - the Security Orchestration, Automation and Response (SOAR) platform.
Join us on Tuesday December 4th at Grand Hotel to wrap up the year with exciting presentations from Splunk and mnemonic.
Breakfast and registration
Threat Intelligence Update
mnemonic's Threat Intelligence team will take a look at the year that has past, the significance of these developments, and what it means for the future.
Technical level: 2/5
How can SOAR strengthen your security operations?
Security Orchestration, Automation and Response (SOAR) enables security teams to work smarter and respond faster. Multi-vendor IT infrastructure and security solutions often work in silos and don’t communicate with each other. SOAR is the missing puzzle piece that allows you to harness the full power of your existing security investments and enables them to work as a unified team to automate response tasks and improve investigation efficiency.
The presentation will provide an introduction to the capabilities of SOAR, and how it can improve the efficiency of your security operations. In his presentation, Robin will also go through a few of the use-cases of the SOAR platform Splunk Phantom, and demonstrate how the platform works.
Read more about Phantom here.
Technical level: 3/5
Incident response and threat hunting with Splunk
mnemonic's Incident Response Team (mIRT) is amongst the largest in Europe. This team handles incidents involving industrial espionage, threats to critical infrastructure, government-supported attacks, and everything in between.
In this presentation, Magnus will present events where Splunk has been used as part of the incident response toolkit, and how Splunk can be used to hunt for advanced threat actors who have positioned themselves in your infrastructure.