Splunk Security Update | Public Sector Summit Germany 2025

113 views 20 slides Apr 29, 2025
Slide 1
Slide 1 of 20
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20

About This Presentation

Splunk Security Update

Sprecher: Marcel Tanuatmadja


Slide Content

© 2025 SPLUNK INC.
Marcel Tanuatmadja

Splunk .conf24 Template | TMPLT-FY25-101
© 2025 SPLUNK INC.© 2025 SPLUNK LLC

Splunk Corporate Template | TMPLT-FY25-102
© 2025 SPLUNK LLC
Master the “Mean-Time-To-X” Game
(D)etect
Mean
Time
To…
Someone
breaks in You notice it

Splunk .conf24 Template | TMPLT-FY25-101
© 2025 SPLUNK INC.© 2025 SPLUNK INC.
Find Content (Sec. Use Cases)
Top-Down works best
1. Do a Risk assessment – understand your organisations Resiliency needs
2. Engage Stakeholders early in the process
3. Identify and prioritize Use Cases
4. Identify and prioritize Data Sources
Top
Down

Splunk .conf24 Template | TMPLT-FY25-101
© 2025 SPLUNK INC.© 2025 SPLUNK INC.
Get Data “in”
Splunk Data Management (DMX)
Filter Normalize
Mask Enrich
Logs to Metrics Aggregate
Public Cloud
Private Cloud
On Premise
Data Lake
Splunk
Cloud
Splunk
Enterprise
Data Management Experience (DMX)

Runs on the Edge and Cloud
End to End Monitoring (incl. Agent Management)
UF, HEC, OTel


Metrics


Logs
Routing


Traces


Events
Splunk O11y
Cloud
Amazon
S3

Splunk .conf24 Template | TMPLT-FY25-101
© 2025 SPLUNK INC.© 2025 SPLUNK INC.
Come up with a Data Storage and Retention Policy
Not all Data is the same
Age of Data
Forensics, Audit & Compliance
<1 sec <1 min<10 sec 1 week 1 year1 month1 hour 1 day 10 year
Prevention, Detection, Monitoring
Incident Review, Investigations, Threat Hunting
Real and Near-Real Time ArchiveAd Hoc

Splunk .conf24 Template | TMPLT-FY25-101
© 2025 SPLUNK INC.© 2025 SPLUNK INC.
Find Content for your Use Cases
Use Vendors Library, Develop it yourself, use Industry Standards… and test it
https://github.com/splunk/attack_rang
e
https://github.com/splunk/attack_rang
e

Splunk .conf24 Template | TMPLT-FY25-101
© 2025 SPLUNK INC.
Prioritize Findings
With Risk-Based-Alerting (RBA)
https://rba.community/

Splunk .conf24 Template | TMPLT-FY25-101
© 2025 SPLUNK INC.
●Gain visibility into risks
associated with LLM models, AI
apps and entities.

●Splunk Cisco Security Cloud App
Pulls in alerts from AI Defense
and maps them to the Common
Information Model (CIM),
visualized in a dashboard.


●Includes an out-of-the-box
Enterprise Security detection
that surfaces potential attacks
against the AI models running in
your environment.
Gain visibility into emerging AI Risks

Splunk Corporate Template | TMPLT-FY25-102
© 2025 SPLUNK LLC
Master the “Mean-Time-To-X” Game
(D)etect (I)nvestigate
(A)cknowlege
Mean
Time
To…
Someone
breaks in You notice it
You figure out what happened,
how it happened and what to do

Splunk .conf24 Template | TMPLT-FY25-101
© 2025 SPLUNK INC.
●Take the manual work out of threat analysis
and integrate into SOC workflows seamlessly
●Ensure a baseline standard of investigation
with consistent, comprehensive, and
high-quality threat analysis and Verdict
Automatic analysis of active threats for contextual insights to accelerate investigations & resolution

“Splunk SOAR is able to take the outputs from Splunk Attack
Analyzer and update the case management ticket with the results
to provide the results of the analysis. This gets the information
right where it needs to go – into the analyst’s hands within
minutes.”

– Sr. Director, Global Security Operations, Splunk
Product Web Page -Product Brief - Product Tour

Splunk Corporate Template | TMPLT-FY25-102
© 2025 SPLUNK LLC© 2025 SPLUNK LLC
You can’t secure, what you can’t see
Incomplete and
Inaccurate Asset Data

52% manage 10,000+ assets
1
Lengthy Security
Investigation

69% experienced an attack
targeting unknown, or poorly
managed assets
2
Gaps in compliance


$4M average revenue
loss due to compliance
audit failures
3
1 Security Hygiene and Posture Management Survey by ESG, Oct 2021, p.12
2 Security Hygiene and Posture Management Survey by ESG, Oct 2021, p.13
3 Whitepaper: The True Cost of Compliance, Ponemon Institute, Dec 2017, p.12
Product Web Page -Product Brief - Technical Tour

Splunk Corporate Template | TMPLT-FY25-102
© 2025 SPLUNK LLC
a
Splunk Add-on
for Talos
Intelligence
All Splunk ES, SOAR, SAA
customers have access

Delivers rich enrichment
for common IOCs

ES
SAA
SOAR

Splunk Corporate Template | TMPLT-FY25-102
© 2025 SPLUNK LLC
Master the “Mean-Time-To-X” Game
(D)etect (I)nvestigate
(A)cknowlege
Mean
Time
To…
Someone
breaks in You notice it
You figure out what happened,
how it happened and what to do
(C)ontainment
You contain
the attack

Splunk .conf24 Template | TMPLT-FY25-101
© 2025 SPLUNK INC.
❖Improved case management
capabilities

❖Native Splunk® SOAR integration

❖Enhanced detection engineering
capabilities
The Market-Leading SIEM
to Power the SOC of the
Future

Splunk Corporate Template | TMPLT-FY25-102
© 2025 SPLUNK LLC© 2025 SPLUNK LLC
Guided security workflows
where you do your work
❖Answer analyst questions to guide
daily workflows
❖Save time while addressing threats
more rapidly
❖Use natural language queries to get
answers during investigations


UI shown is for illustration; not final product.

Splunk Corporate Template | TMPLT-FY25-102
© 2025 SPLUNK LLC
Master the “Mean-Time-To-X” Game
(D)etect (I)nvestigate
(A)cknowlege
(R)espond / Resolution / Remediate
Mean
Time
To…
Someone
breaks in You notice it
You figure out what happened,
how it happened and what to do
You fully neutralize
the attack
You make sure that
attack can’t happen again!
(C)ontainment
You contain
the attack

Splunk Corporate Template | TMPLT-FY25-102
© 2025 SPLUNK LLC© 2025 SPLUNK LLC
Flexible Deployment
Models

Logs Events Alerts Telemetry
Investigation

Risk-Based Alerting | Threat
Hunting | Integrated Analytics
Unified Analyst Experience
Workflows | Case Management | Collaboration
GenAI for SecOps
Summarization | Natural Language Search | Reporting
Threat Detection

Static | Dynamic (ML) |
Pre-Built | Custom | Authoring
Response

Enrichment | Automation |
Orchestration | Playbooks

Common Services
Assets & Identities | Threat Intelligence | Risk
Data Management & Federation
Filter | Mask | Route | Access
Unified
TDIR in a
single
platform
Splunk’s unified TDIR platform approach
True Multi
Vendor

Splunk .conf24 Template | TMPLT-FY25-101
© 2025 SPLUNK INC.
Splunk Enterprise Security: The Core of the Unified TDIR Experience
Unifying Threat Detection, Investigation and Response
Federation
Search & Analytics
Amazon
Security Lake
Additional
Data Lakes
Amazon S3
Cisco XDR
Real-time attack chain
detection
Cisco SNA
Pervasive Network
Detection & Analytics
Splunk Enterprise Security
SOAR
Threat Intelligence
Management
Mission Control
Analytics / Search /
Investigation
Unified SOC Analyst View
Analyst Queue | Findings | Investigations | Case Management

Network Traffic
& Logs
Telemetry
& Alerts

Splunk Corporate Template | TMPLT-FY25-102
© 2025 SPLUNK LLC© 2025 SPLUNK LLC