What You Need to Know About Boss of the SOC
Last year, we introduced a new security activity at Splunk .conf2016 called “Boss of the SOC” (or BOTS). The concept of BOTS was born from our core beliefs that Splunk is an indispensable tool for all information security teams, and that learning can be both realistic and fun.
The first BOTS was a huge hit with over 150 participants! It ended up being one of the biggest events at .conf2016 that no one knew anything about. Since then, we've run more than 60 “BOTS” at locations all around the world, bringing a gamified Splunk security learning experience to over 2,000 individual participants.
As such, we are proud to announce the debut of Boss of the SOC 2.0 at .conf2017.
What Does That Mean?
- New data sets!
- New adversaries!
- New scenarios!
- Splunk Enterprise Security!
- New and improved scoring server!
It's going to be just downright awesome (if we do say so ourselves), but you might be asking yourself: "What is this 'Boss of the SOC'?" "Can I only play at .conf2017?" And maybe even, “How can I play?” or “Should I play?”.
Well, this blog post is here to answer these questions and more.
So What is “BOTS”?
Boss of the SOC is a blue-team jeopardy-style capture-the-flag-esque (CTF) activity where participants use Splunk—and other tools—to answer a variety of questions about security incidents that have occurred in a realistic but fictitious enterprise environment. It's designed to emulate how real security incidents look in Splunk and the type of questions analysts have to answer. We developed Boss of the SOC because we were tired of showing up at security conferences and finding the CTFs to be entirely red-team oriented. There are other Blue Team CTFs out there—especially the grandfather to them all SANS DFIR NetWars—but few (or none) of them attempt to recreate the life of a security analyst facing down an adversary at all stages of an attack.
In the Boss of the SOC CTF, we work very hard to ask questions that not only require contestants to know Splunk, but also know how to research Open Source Intelligence and think outside of the “Splunk” box.
For those of you asking if this is lame, you should know we have a list of "Commandments" to keep us honest. The very first one? "Thou shalt keep it real." Every incident and scenario is based on something that we as previous customers or security analysts have faced before in our career.
Cool! So What Happens in a BOTS Event?
Okay. Should I Play BOTS?
Probably! Seriously if you are reading this blog and you've gotten this far, you are almost certainly a great fit for BOTS. To hold your own in BOTS, we usually tell folks they need to know a little about Splunk and a little about security. However, all you really need is the desire to learn something new and the desire to have a lot of fun. It's true that the winner of a BOTS competition will usually be both very good at Splunk and very good at security, but everyone will have a great time and learn something new. Also—don't forget—BOTS is a team sport, so you bring your crew you won't be alone.
Need to brush up on your Splunk chops beforehand? No problem! Check out our "Hunting with Splunk: The Basics" blog series, which we created specifically to prepare teams for what they will face in BOTS.
So What's the Deal with BOTS at .conf2017?
Without a doubt, the best way to experience BOTS 2.0 will be at Splunk .conf 2017. This year, Boss of the SOC will be held on Monday, September 25th from 7pm to midnight.
Let's just say it is going to be epic.
We will have swag, drinks, trash talk, and of course, special prizes for the winners. If you've registered for .conf2017 and would like to play, all you have to do is sign up for BOTS 2017.
What if I Won't Be at .conf2017?
It's not too late to sign up for .conf2017, but if you really can't make it, fear not. Just reach out to your Splunk account team to find out if a BOTS event is right for your organization. Another option is to keep an eye out for Boss of the SOC events at our Hands-On Workshops coming soon to a location near you!
And as always… Happy Hunting :-)
Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Splunk Security Content for Threat Detection & Response: November Recap

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

AI for Humans: A Beginner’s Field Guide

Splunk Security Content for Threat Detection & Response: November 2025 Update

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
