Heading to Black Hat? Splunk’s Countdown Is On

Hot on the heels — and I mean hot — of .conf23, I’m heading back to Vegas on August 8-10 for Black Hat 2023. Splunk is a proud Platinum Plus sponsor for Black Hat and we’ve got so much in store, both in person and virtually.

Our security thought leaders have recently driven research on topics like the MITRE ATT&CK detection coverage, vulnerabilities in chrome connectors and commonalities in ransomware payloads. They’ll be ready to discuss a new threat hunting framework for the evolving world (PEAK), how the explosion of AI and large language models (LLMs) in the market is creating new risks for organizations to defend against, and the business impact of honing your digital resilience capabilities, based on original Splunk research.

It would be great to see you there or connect online. Here’s a quick overview of what else you can expect.

Dive deep into Splunk’s latest security research, portfolio, projects and rapid response

Meet us at booth #1940 for demos and deep dives into Splunk Attack Range and our latest threat detections and research highlights. I’ll be onsite with Ryan Kovar, Mick Baccio, Rene Aguero, Dimitry McKay and other experts to talk about:

Other highlights you won’t want to miss:

I’m excited to explore how Splunk can help you tackle your most pressing security challenges and minimize business risk. See you at Black Hat.

Related Articles

Inside the Mind of a ‘Rat’ - Agent Tesla Detection and Analysis
Security
12 Minute Read

Inside the Mind of a ‘Rat’ - Agent Tesla Detection and Analysis

The Splunk Threat Research Team (STRT) describes the different tactics, techniques and procedures mapped to the ATT&CK framework leveraged by the Agent Tesla remote access trojan.
Staff Picks for Splunk Security Reading June 2021
Security
5 Minute Read

Staff Picks for Splunk Security Reading June 2021

The 10 Essential Capabilities of a Best-of-Breed SOAR
Security
2 Minute Read

The 10 Essential Capabilities of a Best-of-Breed SOAR

Security orchestration, automation and response (SOAR) tools are here to stay, do you have the best-of-breed SOAR in your security stack?