Invest in your professional development through virtual learning! Join Splunk for free online training through webinars & hands-on workshops from the comfort of your home. Learn how Splunk’s Data-to-Everything platform helps drives confident decisions and decisive actions through real-time, data-driven insights.
As the global COVID-19 pandemic continues, every organization is undergoing unprecedented changes and shifting the demands. Technology plays a critical role in keeping essential services functioning and delivering assistance where and when needed, especially at this time, and Splunk is committed to helping in this effort. Splunk has curated some short term solutions to help organizations overcome current challenges while offering its traditional suite of solutions to ensure strategic advantage.
Webinar Series: Security & Remote Access During this New Normal
Join the webinar series to learn more about how operationalizing your data can help empower IT and security teams to:
Session #1 |
Ensure a safe and productive remote workforce - On-Demand Recording Now AvailableJoin Splunk Interim CIO, Steve McMahon, and a panel of experts in a discussion on operationalizing data with tools and solutions to make confident decisions and take decisive actions at speeds the current crisis warrants.
|
Session #2 |
Secure and scale on-demand your VPN and other remote access applications - On-Demand Recording Now AvailableSecure a remote workforce, including monitoring anomalous activity, remote access events, and data exfiltration points. Scale services on-demand to deliver acceptable levels of end-user experience.
|
Session #3 |
Drive efficient collaboration among remote teams - On-Demand Recording Now Available Manage a fully remote workforce and empowering helpdesk and support teams. Maintain uptime and continuity of mission-critical applications.
|
Session #4 |
Relieve fatigue and focus on mission-critical initiatives with automation - On-Demand Recording Now AvailableSecure a remote workforce, including monitoring anomalous activity, remote access events, and data exfiltration points. Scale services on-demand to deliver acceptable levels of end-user experience. Manage a fully remote workforce and empowering helpdesk and support teams. Maintain uptime and continuity of mission-critical applications.
|
Session #5 |
Use real-time data to monitor & manage your distance learning environment - On-Demand Recording Now AvailableMonitor and manage the distance learning environment. Ensure the best experience in the distance learning environment
|
Session #1
Session #2
Session #3
Session #4
Session #5
Resources
Join Splunk for our weekly webinar series to learn more about how bringing a data-driven approach to your organization helps drive faster, more-confident decisions!
Name | Date | Link |
---|---|---|
Splunk for CMMC Solution: A Deeper Dive
Join Splunk’s, Solutions Architect, Michael Sondag and Carahsoft for a deep dive into the Splunk for Cybersecurity Maturity Model Certification (CMMC) solution. As the Data to Everything (D2E) platform, the Splunk for CMMC solution accelerates organizations’ journey to actively monitor and measure the performance of data-driven practices defined by CMMC. In this session, we’ll dig into the following topics with demonstrations throughout on: |
April 15th | On-Demand Recording Now Available |
Cyber Threats to Elections With the 2020 U.S. presidential election on the horizon, what are the biggest cybersecurity threats our democracy is facing? How well is the election infrastructure prepared when it comes to cybersecurity, and what are some steps to take today to strengthen the security posture?
Join this panel to learn more about |
April 28th | On-Demand Recording Now Available |
Cybersecurity in an Uncertain World –
New Ways to Confront New Ransomware Threats In this extremely high-pressure time, it’s never been more important for governments to get it right on cybersecurity. This critical webinar on April 28 at 10:00am PT/1:00pm ET will explore the latest emerging cyberthreats, and the strategies, best practices and technological tools that states and cities are using to meet the challenge. Join us for an interactive forum with public officials and industry experts, on issues including: |
April 28th | On-Demand Recording Now Available |
Join Splunk’s, Solutions Architect, Michael Sondag and Carahsoft for a deep dive into the Splunk for Cybersecurity Maturity Model Certification (CMMC) solution. As the Data to Everything (D2E) platform, the Splunk for CMMC solution accelerates organizations’ journey to actively monitor and measure the performance of data-driven practices defined by CMMC.
In this session, we’ll dig into the following topics with demonstrations throughout on:
- Aligning data sources to practices for aggregation and continuous monitoring
- Meeting, monitoring, and tracking practices with Splunk
- Advancing maturity and operations with Splunk and the security suite
Join this panel to learn more about
- The current government threat landscape
- Which threats can we expect to see in the next few months?
- Why visibility into the security posture of election infrastructure is key
- What's needed to ramp up security quickly?
- Recommendations for enhancing election security
Join us for an interactive forum with public officials and industry experts, on issues including:
- The biggest cybersecurity threats today – and the greatest emerging challenges for the future
- The steps you can take right now to improve your protection and preparedness for ransomware attacks
- How better analytics, monitoring and alerting can aid in threat detection and contextualization
- Best practices and real-life use cases of cybersecurity innovation
Webinar Series: Turn Data Into Doing with Splunk - Register Now!
Join the webinar series to learn more about how bringing a data-driven approach to your organization helps drive faster, more-confident decisions! There is something for everyone with topics spanning those areas most important to IT, security, and compliance professionals today.
Session #1 |
Splunk's Cloud Forecast - On-Demand Recording Now Available Mandates and mission needs continue to drive agencies to modernize technologies and the rapid evolution of cloud platforms has produced a continuum of options for government IT managers—from a fully on-premises system, to a Software as a Service (SaaS) model that relies entirely on cloud-based capacity. With such a wide array of choices at their fingertips, it’s imperative for managers to adopt a Cloud Smart approach to system procurement, identifying the options that best meet their service and mission needs, technical requirements, and existing policy limitations. Join this webinar to learn how the range of cloud options allows your agency to choose its path to data-driven decision-making.
|
Session #2 |
Enabling Real-Time Compliance Posture Visibility with Splunk - On-Demand Recording Now AvailableAt a time when external threats are becoming ever more sophisticated, and hostile actors have never been more determined, a platform that enables real-time compliance posture visibility is the cornerstone of any effort to protect critical systems and drive rapid, data-driven decisions. While the NIST Cyber Security Framework lays out five fundamental metrics for federal agencies, each of those steps depends on the real-time visibility that enables managers to continually monitor and report on their security posture. On this webinar, we’ll address data sources relevant to FISMA compliance, long-standing historical inhibitors, and overcoming historical inhibitors with Splunk.
|
Session #3 |
Make JADC2 a Reality: Data as the Common Denominator - On-Demand Recording Now Available Joint All Domain Command & Control (JADC2), an evolutionary concept, aims to enhance our warfighting capabilities from a highly centralized construct to a distributed system that connects every sensor to every shooter while blending AI with human cognitive capabilities for confident decisions and actions at the speed of the mission. Multiple systems throughout the DoD are looking to move data at machine speeds across the globe— from subs to satellites, from aircraft and drones to ground troops, and from ships to shore. And success in this mission depends on the ability to harness and analyze disparate, voluminous data in real-time and at scale across multiple domains. Join Splunk to learn how its Data-to-Everything platform can help make JADC2 a reality by bringing data to the mission.
|
Session #4 |
Lesser Known Phantom Features- On-Demand Recording Now Available
Security teams at public sector organizations are hard at work on the front lines: identifying, analyzing, and mitigating the threats facing their organization. Splunk Phantom can help you work smarter by automating repetitive tasks, orchestrating workflows and supporting a broad range of SOC functions. But there are lesser known Phantom features that can effectively force multiply your team’s efforts and help you respond faster and strengthen your defenses. |
Session #5 |
To the Basics and Beyond - There's An App for That- On-Demand Recording Now AvailableWhile organizations have to rely on a complex network of heterogeneous devices, systems, and applications to ensure mission success, a lack of visibility leads to blind spots and the inability to troubleshoot issues. At the same time, the cybersecurity landscape continues to evolve. So, how do you find answers to those tough security questions, or increase visibility to stay ahead of issues? Don’t worry. There’s an app for that! Splunk apps and add-ons and Splunk Essentials can help organizations address specific needs quickly, maximize availability and performance, and enhance their organization's overall security posture.
|
Session #1
Session #2
Session #3
Session #4
Session #5
Get hands-on training at home with Splunk! Our hands-on workshops are a great opportunity for you to discover the value of Splunk in a matter of hours. Continue your professional development and learn more about leveraging data within your organization. Grab a cup of coffee and your laptop and join us as our Splunk engineers will walk you through real-life scenarios!
Name | Date | Time | Register |
---|---|---|---|
Splunk 4 Rookies Designed for Splunk beginners, this 3-hour workshop provides an introduction to Splunk, along with hands-on experience creating a Splunk app and dashboard based on multiple use cases.
During this workshop, you will: - Create your own Splunk distributed environment - Collect and index data - Perform searches - Create interactive dashboards Who should attend? Anyone new to Splunk that would like to understand the basics. |
August 19th | 1pm - 4pm EST | Register Now! |
Infrastructure Monitoring & Troubleshooting Through a series of instructor-led, hands-on activities, you’ll discover how Splunk Infrastructure Monitoring and Troubleshooting capabilities can help your team as you shift to a modern observability practice.
During this workshop, you will: - Gain an understanding of a modern observability strategy and how Splunk for Infrastructure Monitoring and Troubleshooting helps - Investigate an incident and find root cause through advanced troubleshooting and correlation of both metrics and logs - Navigate through typical real-world incidents and tasks, setup intelligent alerting and get an understanding of how this could benefit your own environment Who should attend? - IT Operations and DevOps / Site Reliability teams, including Tier 1 and Tier 2 Analysts and Engineers - ITOps and SRE Managers who want to understand how Splunk can help modernize their IT Operations monitoring capabilities |
September 15th | 1pm - 3:30pm EST | Register Now! |
Phantom Workshop In this workshop you will learn to use Splunk Phantom to respond to incidents, manage cases and artifacts, as well as automate your incident response and other standard operating procedures.
Users will have the opportunity to walk through a real-world scenario and see first-hand how Phantom can be used from the creation of a notable event to enriching alerts by automatically gathering data, all the way to managing and resolving the incident. The workshop agenda includes: - A brief overview of Phantom - Incident investigation - Workbooks and Case Management - Playbook development for automated response - Automation and Orchestration best practices Who should attend? - Tier 1,2,3 SOC analysts - Incident Responders (CIRT/CSIRT/CERT) - Threat Intelligence teams with an interest in automation - Anyone who wants hands-on experience with Phantom including more senior roles such as Head of SOC, SOC Managers, Head of Incident Response |
July 28th | 1pm - 5pm EST | Register Now! |
Business Service Insights Workshop Through a series of instructor-led, hands-on activities, you'll discover the value of IT Service Intelligence (ITSI) and how its service monitoring capabilities can complement traditional Infrastructure Monitoring to provide Operations teams and Line of Business owners realtime, end-to-end visibility into the health of their critical business services.
During this workshop you will: - Gain insight into ITSI and Business Service Monitoring - Investigate and get to the root cause of, a real-world incident impacting a critical business service - Configure alerts and proactive monitoring of critical business services - Navigate through business services topologies Who should attend? - IT Operations teams, including Tier 1 and Tier 2 Analysts who are responsible for the health of the IT environment - Line-of-Business Owners and Services Managers who want to understand how ITSI can help elevate monitoring to view business service health and detect business impacting outages |
August 4th | 1pm - 3:30pm EST | Register Now! |
AWS Cloud Workshop As more critical workloads move to AWS, agencies need to gain critical security, operational and cost management insights across their entire AWS and hybrid environment. Our Securing Your AWS Cloud with Splunk virtual workshop is a great opportunity for you to get real-world experience using AWS data in Splunk for security monitoring and incident response.
In this 4-hour hands-on workshop you will learn: - Where to find security relevant data in AWS - How to become familiar with AWS data in Splunk - How to use this data to detect malicious activity Who should attend? This workshop is designed for those on a Security Operations team responsible for security monitoring and incident response within AWS. |
August 11th | 1pm - 5pm EST | Register Now! |