Have you considered implementing a continuous security monitoring program but been daunted by the road ahead? This talk discusses various approaches for layering Splunk capabilities into a prescriptive security monitoring strategy that not only supports security operations in defense of the enterprise, but also helps achieve compliance objectives across a plethora of laws, regulations and recommendations, as well as reduce overall risk.
Watch this .conf18 session to learn about:
- How we map requirements to use cases, core capabilities and advanced features within ES and other complementary apps
- How to mature the SOC and begin to build out advanced security techniques within the enterprise organization