Use Deception, Automated Response and Threat Emulation to Make Your Defense Proactive [Splunk Enterprise Security, Splunk Machine Learning Toolkit, Phantom, AI/ML]
Update: 2019-12-24
Description
Deception, automation, and real-time data exploitation help security organizations go on offense vs attackers. In this session we will discuss how to use a variety of deception techniques to gather threat intelligence, how to create an automated response, and how to test response playbooks to validate that responses work as expected.
Speaker(s)
Vincent Urias, Researcher, Sandia National Laboratories
Will Stout, Researcher, Sandia National Laboratories
Slides PDF link - https://conf.splunk.com/files/2019/slides/SEC2203.pdf?podcast=1577146239
Product: Splunk Enterprise Security, Splunk Machine Learning Toolkit, Phantom, AI/ML
Track: Security, Compliance and Fraud
Level: Intermediate

Speaker(s)
Vincent Urias, Researcher, Sandia National Laboratories
Will Stout, Researcher, Sandia National Laboratories
Slides PDF link - https://conf.splunk.com/files/2019/slides/SEC2203.pdf?podcast=1577146239
Product: Splunk Enterprise Security, Splunk Machine Learning Toolkit, Phantom, AI/ML
Track: Security, Compliance and Fraud
Level: Intermediate
Comments
In Channel