Data Obfuscation and Field Protection in Splunk

Size: px
Start display at page:

Download "Data Obfuscation and Field Protection in Splunk"

Transcription

1 Data Obfuscation and Field Protection in Splunk Angelo Brancato Security Specialist Dirk Nitschke Senior Sales Engineer 28 September 2017 Washington, DC

2 2017 SPLUNK INC. Agenda Protect Your Machine Data The Drivers The Solution The Demo

3 2017 SPLUNK INC. Agenda Protect Your Machine Data The Drivers The Solution The Demo

4 Who we are Dirk Nitschke Senior Sales Engineer Angelo Brancato Security Specialist

5 Forward-Looking Statements During the course of this presentation, we may make forward-looking statements regarding future events or the expected performance of the company. We caution you that such statements reflect our current expectations and estimates based on factors currently known to us and that actual events or results could differ materially. For important factors that may cause actual results to differ from those contained in our forward-looking statements, please review our filings with the SEC. The forward-looking statements made in this presentation are being made as of the time and date of its live presentation. If reviewed after its live presentation, this presentation may not contain current or accurate information. We do not assume any obligation to update any forward looking statements we may make. In addition, any information about our roadmap outlines our general product direction and is subject to change at any time without notice. It is for informational purposes only and shall not be incorporated into any contract or other commitment. Splunk undertakes no obligation either to develop the features or functionality described or to include any such feature or functionality in a future release. Splunk, Splunk>, Listen to Your Data, The Engine for Machine Data, Splunk Cloud, Splunk Light and SPL are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners Splunk Inc. All rights reserved.

6 Why? Minimize Risk, Enable Business

7

8

9 Problem Validation Confidential data in events can not be shared / collected - Cross border organization - SIEM as a Service - Cloud Regulation (like GDPR, PCI, HIPAA) have strict imposts on protecting personal data

10 How? Transport Presentation & Data Layer Protection

11 Transport, Data, and Presentation Layer Protection on-site cloud Containers Online Services On-Premises Private Cloud Servers Storage Security Desktops Web Services Networks GPS Location RFID Packaged Applications Messaging Custom Applications Always-On Transport Layer Protection (TLS) Public Cloud Online Shopping Cart Smartphones and Devices Telecoms Web Clickstreams Firewall Intrusion Prevention Call Detail Records Databases Energy Meters Forwarder Indexer Search Head Splunk User Event Data Presentation Layer Protection Option 1 Event Data Data Layer Protection (In-Motion & At-Rest ) Option 2

12 Option 1: Presentation Layer Protection on-site cloud Result Masking Containers Online Services On-Premises Private Cloud Servers Storage Security Desktops Web Services Networks GPS Location RFID Packaged Applications Messaging Custom Applications Always-On Transport Layer Protection (TLS) Public Cloud Online Shopping Cart Smartphones and Devices Telecoms Web Clickstreams Firewall Intrusion Prevention Call Detail Records Databases Energy Meters Forwarder Indexer Search Head Splunk User Data as is Presentation Layer Protection Anonymization (e.g. SHA256 hash) ccn=fb415937c6f b300720cb3f2e82340a09b42b074fd13a09bc341fd a ccn= Pseudonymization (e.g. AES256 encryption) Format Preserving Pseudonymization (e.g. Format-Preserving-Encryption / Tokenization) ccn=u2fsdgvkx1+pn/g/s3axzklq+dmegbki0p4h6ge86zjupeyjlvayebfnl3xm6tyz ccn=

13 Option 2: Data Layer Protection on-site cloud Regex Replace Scheduled Search Containers Online Services On-Premises Private Cloud Servers Storage Security Desktops Web Services Networks GPS Location RFID Packaged Applications Messaging Custom Applications Always-On Transport Layer Protection (TLS) Public Cloud Online Shopping Cart Smartphones and Devices Telecoms Web Clickstreams Firewall Intrusion Prevention Call Detail Records Databases Energy Meters Forwarder Indexer Search Head Splunk User Data as is Data Layer Protection (In-Motion & At-Rest ) Anonymization (e.g. SHA256 hash) ccn=fb415937c6f b300720cb3f2e82340a09b42b074fd13a09bc341fd a ccn= Pseudonymization (e.g. AES256 encryption) Format Preserving Pseudonymization (e.g. Format-Preserving-Encryption / Tokenization) ccn=u2fsdgvkx1+pn/g/s3axzklq+dmegbki0p4h6ge86zjupeyjlvayebfnl3xm6tyz ccn=

14 Option 2: Data Layer Protection on-site cloud Modular / Batch Processing Containers Online Services On-Premises Private Cloud Servers Storage Security Desktops Web Services Networks GPS Location RFID Packaged Applications Messaging Custom Applications Optional: + Original Event Always-On Transport Layer Protection (TLS) Public Cloud Online Shopping Cart Smartphones and Devices Telecoms Web Clickstreams Firewall Intrusion Prevention Call Detail Records Databases Energy Meters Forwarder Indexer Search Head Splunk User Data as is Data Layer Protection (In-Motion & At-Rest ) Anonymization (e.g. SHA256 hash) ccn=fb415937c6f b300720cb3f2e82340a09b42b074fd13a09bc341fd a ccn= Pseudonymization (e.g. AES256 encryption) Format Preserving Pseudonymization (e.g. Format-Preserving-Encryption / Tokenization) ccn=u2fsdgvkx1+pn/g/s3axzklq+dmegbki0p4h6ge86zjupeyjlvayebfnl3xm6tyz ccn=

15 Option 2: Data Layer Protection EP (External Processor) External Processor on-site cloud Containers Online Services On-Premises Private Cloud Servers Storage Security Desktops Web Services Networks GPS Location RFID Packaged Applications Messaging Custom Applications Optional: + Original Event Always-On Transport Layer Protection (TLS) Public Cloud Online Shopping Cart Smartphones and Devices Telecoms Web Clickstreams Firewall Intrusion Prevention Call Detail Records Databases Energy Meters Forwarder Indexer Search Head Splunk User Data as is Data Layer Protection (In-Motion & At-Rest ) Anonymization (e.g. SHA256 hash) ccn=fb415937c6f b300720cb3f2e82340a09b42b074fd13a09bc341fd a ccn= Pseudonymization (e.g. AES256 encryption) Format Preserving Pseudonymization (e.g. Format-Preserving-Encryption / Tokenization) ccn=u2fsdgvkx1+pn/g/s3axzklq+dmegbki0p4h6ge86zjupeyjlvayebfnl3xm6tyz ccn=

16 What is Format Preserving Encryption? An Analogy Original Standard Encryption Format Preserving

17

18 What? Various Options to Protect Event Fields

19 Protect Field Values

20 Data Flow Application Input Pipeline Index Search User Any data source Monitor FIFO UDP/TCP HEC Scripted Modular Parsing Merging Typing Indexing RBAC Data Integrity Control OS / Device RBAC Simple XML SPL Policies Processes

21 Data Source Layer Application Application Input Pipeline Index Search User Protect data at earliest stage in the process Data source owner is responsible Application support May need a means to decode data again

22 Input Layer Modular / Batch Processing Application Input Pipeline Index Search User Pre-process data Create your own data input capabilities using a modular input Very flexible Requires scripting, programming

23 External Processor Application Input Pipeline Index Search User Ext. Proc. Forward raw data plus meta data to external processing engine Output of external processor is an input for Splunk again Very flexible but also complex

24 Built-In at Indexing Time Regex Replace Application Input Pipeline Index Search User Typing pipeline / regex replacement processor Uses SEDCMD or TRANSFORMS to modify data at indexing time Easy to implement Limited flexibility, mainly anonymization

25 Copy Events Scheduled Search Application Input Pipeline Index Search User Scheduled search selects and transforms the data SPL and custom search commands if needed Send modified events to a different index Think about collect, cefout, or a custom search command Modified events are delayed because of scheduling Preservation of event metadata

26 Presentation Layer Result Masking Application Input Pipeline Index Search User Hide data at presentation layer <your_search> eval user=sha256(user) or your own custom search command Optionally: user lockdown Pre-defined app with dashboard access only No search app, no raw search, no raw event drill down May be good enough

27 Option Layer Latency Security Complexity Usability Application Data Source Low Very High Modular / Batch External Processor Data Data Medium (API calls) Medium (API calls) Regex Replace Data Medium Scheduled Search Data Very High (schedule) Result Masking Presentation Medium Overview All Options No scientific research Medium (decoding) Medium (decoding) High High High High High High High (anonymization) Low Low (need-to-know) Low Medium Low Low (anonymization) Medium (due to latency) High

28 2017 SPLUNK INC. 1. Many possible ways each has pros and cons Summing Up 2. Qualify what are the requirements and boundary conditions 3. Data obfuscation requires a proper concept and careful planning 4. Choose and mix and keep it simple

29 How? Demo Just a Demo Your Mileage Will Vary

30 Demo Setup bar.log Pipeline secret DPO role unclassified Default role firstname, lastname, , cc, src_ip Scheduled Search, Custom Search Command

31 Demo Setup foo.log Pipeline secret DPO role Ext. Proc. unclassified Default role firstname, lastname, , cc, src_ip Clone sourcetype, transforms, output as raw Modify Events, send to HEC SEDCMD

32 Original Events 2017 SPLUNK INC.

33 2017 SPLUNK INC. Processed Events Masked critical data

34 2017 SPLUNK INC. Workflow Action Decode field values from the UI

35 Decoding Dashboard 2017 SPLUNK INC.

36 2017 SPLUNK INC. Custom Search Command Encoding and decoding

37 2017 SPLUNK INC. Decryption Command Usage Track usage of critical commands

38 2017 SPLUNK INC. Common Dashboard Privileged view

39 2017 SPLUNK INC. Common Dashboard Normal view

40 2017 SPLUNK INC. Enterprise Security Normal view

41 2017 SPLUNK INC. Enterprise Security Normal view

42 2017 SPLUNK INC. Enterprise Security Normal view

43 2017 SPLUNK INC. Enterprise Security Normal view

44 2017 SPLUNK INC. Enterprise Security Normal view

45 Q&A Angelo Brancato Security Specialist Dirk Nitschke Senior Sales Engineer

46 2017 SPLUNK INC. Thank You Don't forget to rate this session in the.conf2017 mobile app

Measuring HEC Performance For Fun and Profit

Measuring HEC Performance For Fun and Profit Measuring HEC Performance For Fun and Profit Itay Neeman Director, Engineering, Splunk Clif Gordon Principal Software Engineer, Splunk September 2017 Washington, DC Forward-Looking Statements During the

More information

Create Dashboards that People Love

Create Dashboards that People Love Create Dashboards that People Love Introducing Splunk Dashboard Design Guidelines Iryna Vogler User Experience Design September 26, 2017 Washington, DC Forward-Looking Statements During the course of this

More information

Using Splunk Enterprise To Optimize Tailored Long-term Data Retention

Using Splunk Enterprise To Optimize Tailored Long-term Data Retention Using Splunk Enterprise To Optimize Tailored Long-term Data Retention Tomasz Bania Incident Response Lead, Dolby Eric Krieser Splunk Professional Services September 2017 Washington, DC Forward-Looking

More information

DB Connect Is Back. and it is better than ever. Tyler Muth Denis Vergnes. September 2017 Washington, DC

DB Connect Is Back. and it is better than ever. Tyler Muth Denis Vergnes. September 2017 Washington, DC DB Connect Is Back and it is better than ever Tyler Muth Denis Vergnes September 2017 Washington, DC Forward-Looking Statements During the course of this presentation, we may make forward-looking statements

More information

FFIEC Cybersecurity Assessment Tool

FFIEC Cybersecurity Assessment Tool FFIEC Cybersecurity Assessment Tool Cybersecurity Controls & Incidence Mappings for Splunk Enterprise, Enterprise Security, User Behavior Analytics Curtis Johnson Senior Sales Engineer & Security SME September

More information

Next Generation Dashboards

Next Generation Dashboards Next Generation Dashboards Stephen Luedtke Sr. Technical Marketing Manager September 27, 2017 Washington, DC Forward-Looking Statements During the course of this presentation, we may make forward-looking

More information

Docker and Splunk Development

Docker and Splunk Development Docker and Splunk Development Empowering Splunk Development with Docker Ron Cooper & David Kraemer Booz Allen Hamilton 26 September 2017 Washington, DC Forward-Looking Statements During the course of this

More information

Dashboard Time Selection

Dashboard Time Selection Dashboard Time Selection Balancing flexibility with a series of system-crushing searches Chuck Gilbert Analyst, chuck_gilbert@comcast.com September 2017 Washington, DC Forward-Looking Statements During

More information

Data Onboarding. Where Do I begin? Luke Netto Senior Professional Services Splunk. September 26, 2017 Washington, DC

Data Onboarding. Where Do I begin? Luke Netto Senior Professional Services Splunk. September 26, 2017 Washington, DC Data Onboarding Where Do I begin? Luke Netto Senior Professional Services Consultant @ Splunk September 26, 2017 Washington, DC Forward-Looking Statements During the course of this presentation, we may

More information

Dashboards & Visualizations: What s New

Dashboards & Visualizations: What s New Dashboards & Visualizations: What s New Nicholas Filippi Product Management, Splunk Patrick Ogdin Product Management, Splunk September 2017 Washington, DC Welcome Patrick Ogdin Product Management, Splunk

More information

Bring Context To Your Machine Data With Hadoop, RDBMS & Splunk

Bring Context To Your Machine Data With Hadoop, RDBMS & Splunk Bring Context To Your Machine Data With Hadoop, RDBMS & Splunk Raanan Dagan and Rohit Pujari September 25, 2017 Washington, DC Forward-Looking Statements During the course of this presentation, we may

More information

Running Splunk Enterprise within Docker

Running Splunk Enterprise within Docker Running Splunk Enterprise within Docker Michael Clayfield Partner Consultant 03/09/2017 1.1 Forward-Looking Statements During the course of this presentation, we may make forward-looking statements regarding

More information

Making Sense of Web Fraud With Splunk Stream

Making Sense of Web Fraud With Splunk Stream Making Sense of Web Fraud With Splunk Stream An in-depth look at Stream use cases and customer success stories with a focus on stream:http Jim Apger Minister of Mayhem Senior Security Architect Matthew

More information

Dashboard Wizardry. Advanced Dashboard Interactivity. Siegfried Puchbauer Principal Software Engineer Yuxiang Kou Software Engineer

Dashboard Wizardry. Advanced Dashboard Interactivity. Siegfried Puchbauer Principal Software Engineer Yuxiang Kou Software Engineer Dashboard Wizardry Advanced Dashboard Interactivity Siegfried Puchbauer Principal Software Engineer Yuxiang Kou Software Engineer September 25, 2017 Washington, DC Brought To You By Siegfried Puchbauer

More information

Modernizing InfoSec Training and IT Operations at USF

Modernizing InfoSec Training and IT Operations at USF Modernizing InfoSec Training and IT Operations at USF Goodbye Tedious Tasks! A Novel Automation Framework Leveraging Splunk Tim Ip, Senior Security Engineer Nicholas Recchia, Director & Information Security

More information

Splunk & AWS. Gain real-time insights from your data at scale. Ray Zhu Product Manager, AWS Elias Haddad Product Manager, Splunk

Splunk & AWS. Gain real-time insights from your data at scale. Ray Zhu Product Manager, AWS Elias Haddad Product Manager, Splunk Splunk & AWS Gain real-time insights from your data at scale Ray Zhu Product Manager, AWS Elias Haddad Product Manager, Splunk Forward-Looking Statements During the course of this presentation, we may

More information

Visualizing the Health of Your Mobile App

Visualizing the Health of Your Mobile App Visualizing the Health of Your Mobile App Jay Tamboli ios Engineer, Capital One September 26, 2017 Washington, DC Forward-Looking Statements During the course of this presentation, we may make forward-looking

More information

A Trip Through The Splunk Data Ingestion And Retrieval Pipeline

A Trip Through The Splunk Data Ingestion And Retrieval Pipeline A Trip Through The Splunk Data Ingestion And Retrieval Pipeline Harold Murn Senior Systems Engineer 2017-09-27 Washington, DC Forward-Looking Statements During the course of this presentation, we may make

More information

Splunking Your z/os Mainframe Introducing Syncsort Ironstream

Splunking Your z/os Mainframe Introducing Syncsort Ironstream Copyright 2016 Splunk Inc. Splunking Your z/os Mainframe Introducing Syncsort Ironstream Ed Hallock Director of Product Management, Syncsort Inc. Disclaimer During the course of this presentation, we may

More information

Metrics Analysis with the Splunk Platform

Metrics Analysis with the Splunk Platform Metrics Analysis with the Splunk Platform How to work with metrics for Monitoring, Alerting, and ad-hoc analysis at scale Michael Porath Product Management, Splunk Allan Yan Principal Software Engineer,

More information

Best Practices and Better Practices for Users

Best Practices and Better Practices for Users Best Practices and Better Practices for Users while you get settled Latest Slides: https://splunk.box.com/v/blueprints-practices-user Collaborate: #bestpractices Sign Up @ http://splk.it/slack Load Feedback

More information

Atlassian s Journey Into Splunk

Atlassian s Journey Into Splunk Atlassian s Journey Into Splunk The Building Of Our Logging Pipeline On AWS Tim Clancy Engineering Manager, Observability James Mackie Infrastructure Engineer, Observability September 2017 Washington,

More information

Monitoring Docker Containers with Splunk

Monitoring Docker Containers with Splunk Monitoring Docker Containers with Splunk Marc Chéné Product Manager Sept 27, 2017 Washington, DC Forward-Looking Statements During the course of this presentation, we may make forward-looking statements

More information

Architecting Splunk For High Availability And Disaster Recovery

Architecting Splunk For High Availability And Disaster Recovery Architecting Splunk For High Availability And Disaster Recovery Sean Delaney Principal Architect, Splunk September 2017 Washington, DC Forward-Looking Statements During the course of this presentation,

More information

Indexer Clustering Fixups

Indexer Clustering Fixups Indexer Clustering Fixups Cluster recovery process Da Xu Engineering Splunk Forward-Looking Statements During the course of this presentation, we may make forward-looking statements regarding future events

More information

Need for Speed: Unleashing the Power of SecOps with Adaptive Response. Malhar Shah CEO, Crest Data Systems Meera Shankar Alliance Manager, Splunk

Need for Speed: Unleashing the Power of SecOps with Adaptive Response. Malhar Shah CEO, Crest Data Systems Meera Shankar Alliance Manager, Splunk Need for Speed: Unleashing the Power of SecOps with Adaptive Response Malhar Shah CEO, Crest Data Systems Meera Shankar Alliance Manager, Splunk September 27, 2017 Washington, DC Forward-Looking Statements

More information

Introducing Splunk Validated Architectures (SVA)

Introducing Splunk Validated Architectures (SVA) Introducing Splunk Validated Architectures (SVA) Optimizing Your Path To Success With Splunk Sean Delaney Principal Architect Stefan Sievert Staff Architect September 2017 Washington, DC Forward-Looking

More information

The Power of Data Normalization. A look at the Common Information Model

The Power of Data Normalization. A look at the Common Information Model The Power of Data Normalization A look at the Common Information Model Mark Bonsack, CISSP Vladimir Skoryk, CISSP, CCFE, CHFI, CISA, CISM, RGTT Staff Sales Engineer, Splunk PS Supreme Architect, Splunk

More information

Splunking with Multiple Personalities

Splunking with Multiple Personalities Splunking with Multiple Personalities Extending Role Based Access Control to achieve fine grain security of your data Sabrina Lea Senior Sales Engineer, Splunk Shaun C Splunk Customer September 2017 Forward-Looking

More information

Indexer Clustering Internals & Performance

Indexer Clustering Internals & Performance Indexer Clustering Internals & Performance Da Xu Chloe Yeung September 28, 2017 Washington, DC Forward-Looking Statements During the course of this presentation, we may make forward-looking statements

More information

Making the Most of the Splunk Scheduler

Making the Most of the Splunk Scheduler Making the Most of the Splunk Scheduler Paul J. Lucas Principal Software Engineer, Splunk September 25 28, 2017 Washington, DC Forward-Looking Statements During the course of this presentation, we may

More information

Extending SPL with Custom Search Commands

Extending SPL with Custom Search Commands Extending SPL with Custom Search Commands Jacob Leverich Director of Engineering 2017/08/11 Washington, DC Forward-Looking Statements During the course of this presentation, we may make forward-looking

More information

Bringing Sweetness to Sour Patch Tuesday

Bringing Sweetness to Sour Patch Tuesday Bringing Sweetness to Sour Patch Tuesday Pacific Northwest National Laboratory Justin Brown & Arzu Gosney September 27, 2017 Washington, DC Forward-Looking Statements During the course of this presentation,

More information

Scaling Indexer Clustering

Scaling Indexer Clustering Scaling Indexer Clustering 5 Million Unique Buckets and Beyond Cher-Hung Chang Principal Software Engineer Tameem Anwar Software Engineer 09/26/2017 Washington, DC Forward-Looking Statements During the

More information

Dragons and Splunk Do Not Do Well In Captivity

Dragons and Splunk Do Not Do Well In Captivity Dragons and Splunk Do Not Do Well In Captivity Tame Splunk Dragons Before Winter Comes Kyle Prins & Keith Quebodeaux DellEMC Splunk Ninjas September 2017 Washington, DC Forward-Looking Statements During

More information

Search Head Clustering Basics To Best Practices

Search Head Clustering Basics To Best Practices Search Head Clustering Basics To Best Practices Bharath Aleti Product Manager, Splunk Manu Jose Sr. Software Engineer, Splunk September 2017 Washington, DC Forward-Looking Statements During the course

More information

Essentials to creating your own Security Posture using Splunk Enterprise

Essentials to creating your own Security Posture using Splunk Enterprise Essentials to creating your own Security Posture using Splunk Enterprise Using Splunk to maximize the efficiency and effectiveness of the SOC / IR Richard W. McKee, MS-ISA, CISSP Principal Cyber Security

More information

Building Your First Splunk App with the Splunk Web Framework

Building Your First Splunk App with the Splunk Web Framework Copyright 2013 Splunk Inc. Building Your First Splunk App with the Splunk Web Framework Itay Neeman Dev Manager, Splunk Sea@le #splunkconf Legal NoMces During the course of this presentamon, we may make

More information

Copyright 2014 Splunk Inc. Splunk for VMware. Architecture & Design. Michael Donnelly, Sr. Sales Engineer

Copyright 2014 Splunk Inc. Splunk for VMware. Architecture & Design. Michael Donnelly, Sr. Sales Engineer Copyright 2014 Splunk Inc. Splunk for VMware Architecture & Design Michael Donnelly, Sr. Sales Engineer Disclaimer During the course of this presentaeon, we may make forward looking statements regarding

More information

Enterprise Security Biology

Enterprise Security Biology Enterprise Security Biology Dissecting the Threat Intelligence Framework John Stoner Staff Security Architect US Public Sector and then some September 2017 Forward-Looking Statements During the course

More information

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT) Page 1 of 6 IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT) I. Understanding the need for privacy in the IT environment A. Evolving

More information

Cloud is the 'Only' Way Forward in Information Security. Leveraging Scale to Make the Unknown Known, in Dev, Sec & Ops.

Cloud is the 'Only' Way Forward in Information Security. Leveraging Scale to Make the Unknown Known, in Dev, Sec & Ops. George Gerchow, Sumo Logic Chief Information Security Officer Cloud is the 'Only' Way Forward in Information Security. Leveraging Scale to Make the Unknown Known, in Dev, Sec & Ops. Agenda Sumo Security

More information

Tracking Logs at Zillow with Lookups & JIRA

Tracking Logs at Zillow with Lookups & JIRA Tracking Logs at Zillow with Lookups & JIRA Seth Thomas, Jon Wentworth September 27 Washington, DC Forward-Looking Statements During the course of this presentation, we may make forward-looking statements

More information

Xerox Audio Documents App

Xerox Audio Documents App Xerox Audio Documents App Additional information, if needed, on one or more lines Month 00, 0000 Information Assurance Disclosure 2018 Xerox Corporation. All rights reserved. Xerox, Xerox,

More information

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT) Page 1 of 6 IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT) I. Understanding the need for privacy in the IT environment A. Evolving

More information

Splunk N Box. Splunk Multi-Site Clusters In 20 Minutes or Less! Mohamad Hassan Sales Engineer. 9/25/2017 Washington, DC

Splunk N Box. Splunk Multi-Site Clusters In 20 Minutes or Less! Mohamad Hassan Sales Engineer. 9/25/2017 Washington, DC Splunk N Box Splunk Multi-Site Clusters In 20 Minutes or Less! Mohamad Hassan Sales Engineer 9/25/2017 Washington, DC Forward-Looking Statements During the course of this presentation, we may make forward-looking

More information

Search Language - Beginner Mitch Fleischman

Search Language - Beginner Mitch Fleischman Copyright 2013 Splunk Inc. Search Language - Beginner Mitch Fleischman Senior Instructor #splunkconf Legal NoDces During the course of this presentadon, we may make forward- looking statements regarding

More information

Search Optimization. Alex James. Karthik Sabhanatarajan. Principal Product Manager, Splunk. Senior Software Engineer, Splunk

Search Optimization. Alex James. Karthik Sabhanatarajan. Principal Product Manager, Splunk. Senior Software Engineer, Splunk Copyright 2016 Splunk Inc. Search Optimization Alex James Principal Product Manager, Splunk & Karthik Sabhanatarajan Senior Software Engineer, Splunk Session Outline Why Optimize SPL? What does optimization

More information

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT) Page 1 of 6 IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT) I. Understanding the need for privacy in the IT environment A. Evolving

More information

Squeezing all the Juice out of Splunk Enterprise Security

Squeezing all the Juice out of Splunk Enterprise Security Squeezing all the Juice out of Splunk Enterprise Security Marquis Montgomery, CISSP Sr. Staff Security Consultant, Splunk Jae Jung Professional Services Consultant, Splunk September 23 25, 2017 Washington,

More information

SnapCenter Software 4.0 Concepts Guide

SnapCenter Software 4.0 Concepts Guide SnapCenter Software 4.0 Concepts Guide May 2018 215-12925_D0 doccomments@netapp.com Table of Contents 3 Contents Deciding whether to use the Concepts Guide... 7 SnapCenter overview... 8 SnapCenter architecture...

More information

Fields, Indexed Tokens, And You

Fields, Indexed Tokens, And You Fields, Indexed Tokens, And You Martin Müller Professional Services Consultant, Consist Software Solutions GmbH September 42 nd, 2017 Washington, DC Forward-Looking Statements During the course of this

More information

Docker Universal Control Plane Deploy and Manage On-Premises, Your Dockerized Distributed Applications

Docker Universal Control Plane Deploy and Manage On-Premises, Your Dockerized Distributed Applications Technical Brief Docker Universal Control Plane Deploy and Manage On-Premises, Your Dockerized Distributed Applications As application teams deploy their Dockerized applications into production environments,

More information

Building a Threat-Based Cyber Team

Building a Threat-Based Cyber Team Building a Threat-Based Cyber Team Anthony Talamantes Manager, Defensive Cyber Operations Todd Kight Lead Cyber Threat Analyst Sep 26, 2017 Washington, DC Forward-Looking Statements During the course of

More information

Security Compliance and Data Governance: Dual problems, single solution CON8015

Security Compliance and Data Governance: Dual problems, single solution CON8015 Security Compliance and Data Governance: Dual problems, single solution CON8015 David Wolf Director of Product Management Oracle Development, Enterprise Manager Steve Ries Senior Systems Architect Technology

More information

Onboard Data into Splunk, Correctly

Onboard Data into Splunk, Correctly Copyright 2013 Splunk Inc. Onboard Data into Splunk, Correctly Ma:hew Se=pane Professional Services Manager, Splunk #splunkconf Legal NoJces During the course of this presentajon, we may make forward-

More information

Search Language Intermediate Lincoln Bowser

Search Language Intermediate Lincoln Bowser Copyright 2013 Splunk Inc. Search Language Intermediate Lincoln Bowser Sr. Technical Instructor, Splunk #splunkconf Legal NoFces During the course of this presentafon, we may make forward- looking statements

More information

Cloud FastPath: Highly Secure Data Transfer

Cloud FastPath: Highly Secure Data Transfer Cloud FastPath: Highly Secure Data Transfer Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. Tervela has been creating high performance

More information

Security Guide Zoom Video Communications Inc.

Security Guide Zoom Video Communications Inc. Zoom unifies cloud video conferencing, simple online meetings, group messaging, and a softwaredefined conference room solution into one easy-to-use platform. Zoom offers the best video, audio, and wireless

More information

ngenius Products in a GDPR Compliant Environment

ngenius Products in a GDPR Compliant Environment l FAQ l ngenius Products in a GDPR Compliant Environment This document addresses questions from organizations that use ngenius Smart Data Core platform and application products and are evaluating their

More information

Splunk for Ad Hoc Explora2on of Twi6er (and more) Stephen Sorkin VP Engineering, Splunk

Splunk for Ad Hoc Explora2on of Twi6er (and more) Stephen Sorkin VP Engineering, Splunk Splunk for Ad Hoc Explora2on of Twi6er (and more) Stephen Sorkin VP Engineering, Splunk Who am I Berkeley PhD dropout. LeH to work at HP Labs. At Splunk since 2005. VP Engineering since 2010. Run the core

More information

The Art of Detection. Using Splunk Enterprise Security

The Art of Detection. Using Splunk Enterprise Security The Art of Detection Using Splunk Enterprise Security Doug Brown Senior Information Security Analyst, Red Hat 95B6 922E 47D2 7BC3 D1AF F62C 82BC 992E 7CDD 63B6 September 27, 2017 Washington, DC PRESENTATIONS.

More information

Splunk For Google Analytics

Splunk For Google Analytics Copyright 2016 Splunk Inc. Splunk For Google Analytics Charles Adriaenssens, Business Analytics Lead Rory Blake, Staff PS Consultant Disclaimer During the course of this presentation, we may make forward

More information

Splunk Helping in Productivity

Splunk Helping in Productivity Splunk Helping in Productivity Sumit Nagal Principal Engineer, Intuit @sumitnagal 27-Sept-2017 Washington, DC Forward-Looking Statements During the course of this presentation, we may make forward-looking

More information

Real-Time Vulnerability Management Operationalizing the VM process from detection to remediation

Real-Time Vulnerability Management Operationalizing the VM process from detection to remediation 18 QUALYS SECURITY CONFERENCE 2018 Real-Time Vulnerability Management Operationalizing the VM process from detection to remediation Jimmy Graham Senior Director, Product Management, Qualys, Inc. Agenda

More information

Real Time Monitoring Of A Cloud Based Micro Service Architecture Using Splunkcloud And The HTTP Eventcollector

Real Time Monitoring Of A Cloud Based Micro Service Architecture Using Splunkcloud And The HTTP Eventcollector Copyright 2016 Splunk Inc. Real Time Monitoring Of A Cloud Based Micro Service Architecture Using Splunkcloud And The HTTP Eventcollector Mike Sclimen; Experian Consumer Services, Splunk Inc. MaB Poland

More information

Publishing Enterprise Web Applications to BYOD using a Granular. Trust Model. Shachaf Levi IT Client Security & Connectivity May 2013.

Publishing Enterprise Web Applications to BYOD using a Granular. Trust Model. Shachaf Levi IT Client Security & Connectivity May 2013. Publishing Enterprise Web Applications to BYOD using a Granular Trust Model Shachaf Levi IT Client Security & Connectivity May 2013 Public Legal Notices This presentation is for informational purposes

More information

Office 365 and Azure Active Directory Identities In-depth

Office 365 and Azure Active Directory Identities In-depth Office 365 and Azure Active Directory Identities In-depth Jethro Seghers Program Director SkySync #ITDEVCONNECTIONS ITDEVCONNECTIONS.COM Agenda Introduction Identities Different forms of authentication

More information

Real-Time Vulnerability Management Operationalizing the VM process from detection to remediation

Real-Time Vulnerability Management Operationalizing the VM process from detection to remediation 18 QUALYS SECURITY CONFERENCE 2018 Real-Time Vulnerability Management Operationalizing the VM process from detection to remediation Jimmy Graham Director, Product Management, Qualys, Inc. Agenda Expanding

More information

Cloud Access Manager How to Deploy Cloud Access Manager in a Virtual Private Cloud

Cloud Access Manager How to Deploy Cloud Access Manager in a Virtual Private Cloud Cloud Access Manager 8.1.3 How to Deploy Cloud Access Manager in Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

AWS Agility + Splunk Visibility = Cloud Success. Splunk App for AWS Demo. Laura Ripans, AWS Alliance Manager

AWS Agility + Splunk Visibility = Cloud Success. Splunk App for AWS Demo. Laura Ripans, AWS Alliance Manager AWS Agility + Splunk Visibility = Cloud Success Splunk App for AWS Demo Laura Ripans, AWS Alliance Manager Disruptive innovation and business transformation starts with data I HAVE BEEN GIVEN AN AWS ACCOUNT!!!

More information

IntegraBng Splunk Data and FuncBonality Using the Splunk SDK for Java

IntegraBng Splunk Data and FuncBonality Using the Splunk SDK for Java Copyright 2013 Splunk Inc. IntegraBng Splunk Data and FuncBonality Using the Splunk SDK for Java Damien Dallimore Developer Evangelist @ Splunk #splunkconf Legal NoBces During the course of this presentabon,

More information

Splunk. Plataforma de Datos. Denise Roca / Gerente de Software

Splunk. Plataforma de Datos. Denise Roca / Gerente de Software Splunk Plataforma de Datos Denise Roca / droca@tecnoav.com Gerente de Software 2017 SPLUNK INC. This digital evolution is changing everything There s an explosion of data beyond anything our world has

More information

Manage AWS Services. Cost, Security, Best Practice and Troubleshooting. Principal Software Engineer. September 2017 Washington, DC

Manage AWS Services. Cost, Security, Best Practice and Troubleshooting. Principal Software Engineer. September 2017 Washington, DC Manage AWS Services Cost, Security, Best Practice and Troubleshooting Elias Haddad Peter Chen Principal Product Manager Principal Software Engineer September 2017 Washington, DC Agenda Challenges in Managing

More information

Copyright 2015 Splunk Inc. The state of Splunk. Using the KVStore to maintain App State. Stefan Sievert. Client Architect, Splunk Inc.

Copyright 2015 Splunk Inc. The state of Splunk. Using the KVStore to maintain App State. Stefan Sievert. Client Architect, Splunk Inc. Copyright 2015 Splunk Inc. The state of Splunk Using the KVStore to maintain App State Stefan Sievert Client Architect, Splunk Inc. Disclaimer During the course of this presentagon, we may make forward

More information

Understanding Splunk AcceleraGon Technologies David Marquardt

Understanding Splunk AcceleraGon Technologies David Marquardt Copyright 2013 Splunk Inc. Understanding Splunk AcceleraGon Technologies David Marquardt Senior So?ware Engineer #splunkconf Legal NoGces During the course of this presentagon, we may make forward- looking

More information

Time ACer Time Comparing Time Ranges in Splunk Lisa Guinn

Time ACer Time Comparing Time Ranges in Splunk Lisa Guinn Copyright 2013 Splunk Inc. Time ACer Time Comparing Time Ranges in Splunk Lisa Guinn Sr Instructor, Splunk #splunkconf Legal NoGces During the course of this presentagon, we may make forward- looking statements

More information

Dealing with Risk and Compliance to secure your growth 16th May 2018

Dealing with Risk and Compliance to secure your growth 16th May 2018 Dealing with Risk and Compliance to secure your growth 16th May 2018 John Bycroft, SVP Sales Europe Top drivers for Data Security Investment Reputation and brand protection Compliance Regulations Customer

More information

How-to Guide: Tenable Applications for Splunk. Last Revised: August 21, 2018

How-to Guide: Tenable Applications for Splunk. Last Revised: August 21, 2018 How-to Guide: Tenable Applications for Splunk Last Revised: August 21, 2018 Table of Contents Overview 3 Components 4 Tenable Add-on (TA-tenable) 5 Source and Source Types 6 CIM Mapping 7 Tenable App for

More information

Welcome to Tomorrow... Today

Welcome to Tomorrow... Today Copyright 2016 Splunk Inc. Welcome to Tomorrow... Today The need and benefit of merging of IT and Security in today's ever connected world of security and IT Tim Lee CISO, City of LA Ernie Welch Sales

More information

INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS AKAMAI SOLUTIONS BRIEF INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.

INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS AKAMAI SOLUTIONS BRIEF INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3. INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS Protect Critical Enterprise Applications and Cardholder Information with Enterprise Application Access Scope and Audience This guide is for

More information

SnapCenter Software 4.1 Concepts Guide

SnapCenter Software 4.1 Concepts Guide SnapCenter Software 4.1 Concepts Guide August 2018 215-13392_A0 doccomments@netapp.com Table of Contents 3 Contents Deciding whether to read the Concepts Guide... 7 SnapCenter overview... 8 SnapCenter

More information

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Copyright 2013, Oracle and/or its affiliates. All rights reserved. 1 Securing Privileged Accounts with an Integrated IDM Solution Olaf.Stullich@oracle.com Product Manager, Oracle Mike Laramie Oracle Cloud for Industry Architecture Team Buddhika Kottahachchi OPAM Architect

More information

The IT Search Company

The IT Search Company The IT Search Company PCI for Splunk @ Gala Coral Peter Bassill CISO Gala Coral Group The IT Search Company 2 Splunk Inc. 2010 Agenda My 2 minutes of Fame Who is Gala Overview of IT @ Gala What is PCI

More information

Add OKTA as an Identity Provider in EAA

Add OKTA as an Identity Provider in EAA Add OKTA as an Identity Provider in EAA Log in to Akamai Luna control center with administrative privileges. Select the correct contract which is provisioned for Enterprise Application Access (EAA). In

More information

SSQA Seminar Series. Server Side Testing Frameworks. Sachin Bansal Sr. Quality Engineering Manager Adobe Systems Inc. February 13 th, 2007

SSQA Seminar Series. Server Side Testing Frameworks. Sachin Bansal Sr. Quality Engineering Manager Adobe Systems Inc. February 13 th, 2007 SSQA Seminar Series Server Side Testing Frameworks Sachin Bansal Sr. Quality Engineering Manager Adobe Systems Inc. February 13 th, 2007 1 Agenda Introduction Drivers for Server Side Testing Challenges

More information

!1 Copyright 2013, Oracle and/or its affiliates. All rights reserved.

!1 Copyright 2013, Oracle and/or its affiliates. All rights reserved. !1 Oracle Applications User Experiences in the Cloud: Trends and Strategy Noel Portugal Principal UX Developer March, 2014!2 Safe Harbor The following is intended to outline our general product direction.

More information

Data Privacy and Protection GDPR Compliance for Databases

Data Privacy and Protection GDPR Compliance for Databases Data Privacy and Protection GDPR Compliance for Databases Walo Weber, Senior Sales Engineer September, 2016 Agenda GDPR: who, what, why, when Requirements for databases Discovery Classification Masking

More information

Application Logging Best Practices. <Presenter> <Title>

Application Logging Best Practices. <Presenter> <Title> Application Logging Best Practices Agenda Reality of Event Logging Liberating Application Data Operational Best Practices Data Enrichment Other Data Sources More Developer Tools 2 3

More information

Integrating Splunk And AWS Lambda

Integrating Splunk And AWS Lambda Integrating Splunk And AWS Lambda Big Results @ Fast-Food Prices Gary Mikula Senior Director, Cyber & Information Security Siddhartha Dadana Lead Security Engineer Kuljeet Singh Lead Security Engineer

More information

Data Encryption with ServiceNow

Data Encryption with ServiceNow Data Encryption with ServiceNow Encryption Technologies for Data Protection on the ServiceNow Platform Table of Contents Executive summary... 3 Edge Encryption...4 Common use cases... 5 Perspectives on

More information

Get the Most Out of GoAnywhere: Achieving Cloud File Transfers and Integrations

Get the Most Out of GoAnywhere: Achieving Cloud File Transfers and Integrations Get the Most Out of GoAnywhere: Achieving Cloud File Transfers and Integrations Today s Presenter Dan Freeman, CISSP Senior Solutions Consultant HelpSystems Steve Luebbe Director of Development HelpSystems

More information

Connecting Securely to the Cloud

Connecting Securely to the Cloud Connecting Securely to the Cloud Security Primer Presented by Enrico Gregoratto Andrew Marsh Agenda 2 Presentation Speaker Trusting The Connection Transport Layer Security Connecting to the Cloud Enrico

More information

Using Splunk to Assess and Implement Critical Security Control #3

Using Splunk to Assess and Implement Critical Security Control #3 Using Splunk to Assess and Implement Critical Security Control #3 Disclaimer During the course of this presentation, we may make forward looking statements regarding future events or the expected performance

More information

SUSE Manager Roadmap OS Lifecycle Management from the Datacenter to the Cloud

SUSE Manager Roadmap OS Lifecycle Management from the Datacenter to the Cloud SUSE Manager Roadmap OS Lifecycle Management from the Datacenter to the Cloud Joachim Werner Senior Product Manager joe@suse.com Jeff Lindholm Sales Engineer Jlindholm@suse.com SUSE and Linux Workloads

More information

ArcGIS for Server: Security

ArcGIS for Server: Security DevSummit DC February 11, 2015 Washington, DC Michael Sarhan Esri msarhan@esri.com Agenda Review Basic Security Workflow - ArcGIS Server Roles and Identity Stores - Authentication - Authorization: Securing

More information

Technical Deep Dive Splunk Cloud. Copyright 2015 Splunk Inc.

Technical Deep Dive Splunk Cloud. Copyright 2015 Splunk Inc. Technical Deep Dive Splunk Cloud Copyright 2015 Splunk Inc. Disclaimer During the course of this presentaaon, we may make forward looking statements regarding future events or the expected performance

More information

Best Prac:ces + New Feature Overview for the Latest Version of Splunk Deployment Server

Best Prac:ces + New Feature Overview for the Latest Version of Splunk Deployment Server Copyright 2013 Splunk Inc. Best Prac:ces + New Feature Overview for the Latest Version of Splunk Deployment Server Gen: Zaimi Professional Services #splunkconf Legal No:ces During the course of this presenta:on,

More information

ArcGIS Online A Security, Privacy, and Compliance Overview. Andrea Rosso Michael Young

ArcGIS Online A Security, Privacy, and Compliance Overview. Andrea Rosso Michael Young ArcGIS Online A Security, Privacy, and Compliance Overview Andrea Rosso Michael Young ArcGIS Online A Multi-Tenant System Portal Portal Portal ArcGIS Online Agenda Online Platform Security Deployment Architecture

More information

Data Management and Security in the GDPR Era

Data Management and Security in the GDPR Era Data Management and Security in the GDPR Era Franck Hourdin; Vice President, EMEA Security Russ Lowenthal; Director, Database Security Product Management Mike Turner; Chief Operating Officer, Capgemini

More information