I Scream, You Scream, We All Scream For BOTS!

W e are excited to announce our August Boss of the SOC (BOTS) V event!!!

After our global debut of Boss of the SOC (BOTS) V in October at Splunk .conf 2020, we’ve spent the last few months tweaking and tuning to get ready to bring BOTS V to the world... And to quote BOTSFather Ryan Kovar:

“It’s free to play! Free, Free, Free! Free like beer! Not like puppies!”

What’s new in BOTS V? I’m glad you asked. This year, we find our favorite brewery, Frothly, converting to a remote model and embracing the cloud for ‘all the things!’

Additionally, new experiences for players, including a new scoring server, new scenarios, and new stego questions are introduced.

Not sure where to start? That’s ok, we have six new scenarios for you to play. Perhaps you want to see how Splunk Enterprise Security can be utilized. We have a scenario solely on using Enterprise Security. Perhaps you are dipping a toe into Kubernetes (K8S), we’ve got one of those. Looking to work with CloudTrail and other Amazon Web Services (AWS) solutions? There is a scenario on just AWS! We also realize a lot of organizations have remote work initiatives, so we’ve included a Remote Work (RWI) scenario. Our customer favorite APT scenario is back as well — detailing an attack by our favorite adversary Violent Memmes. Are you looking to move infrastructure to Google Cloud (GCP)? Frothly has a supplier who just did that too! We can see what they uncovered! Speaking of that GCP scenario, if anyone can explain the difference between a toad and a frog hit me up.

Details

So what are the details? This BOTS event is set to kick off on Thursday, August 5th, 2021 at 3:00 PM Eastern, 12:00 PM Pacific. Registration is currently open and we’re accepting teams of 1-4 players at the Splunk BOTS website. If you are looking for a team the best place to go is over to our Discord server or reach out to your network on Twitter. It is critical that each player on your team registers.

More Information

Looking for more tips on Boss of the SOC? Don’t forget our handy dandy blog series, "Hunting with Splunk: The Basics,” which was inspired by the questions customers have asked at BOTS events all over the world!

Good Luck! And may the odds be ever in your favor.

P.S. Be sure to check out BOTS VI at .conf 21!

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.