{"id":14666,"date":"2023-07-25T15:29:30","date_gmt":"2023-07-25T14:29:30","guid":{"rendered":"https:\/\/techinsight.net\/?p=14666"},"modified":"2023-07-25T15:29:30","modified_gmt":"2023-07-25T14:29:30","slug":"splunks-conf23-responds-to-our-unprecedented-cybersecurity-landscape","status":"publish","type":"post","link":"https:\/\/techinsight.net\/compliance-and-risk\/splunks-conf23-responds-to-our-unprecedented-cybersecurity-landscape\/","title":{"rendered":"Splunk\u2019s .conf23 Responds To Our Unprecedented Cybersecurity Landscape"},"content":{"rendered":"<p><span style=\"font-weight: 400\">Splunk, a leader in cybersecurity and observability hosted its <\/span><a href=\"https:\/\/conf.splunk.com\/\"><span style=\"font-weight: 400\">.conf23<\/span><\/a><span style=\"font-weight: 400\"> user conference in Las Vegas last week. If you couldn\u2019t make the trip for their 20th anniversary, fear not! We have all the latest here.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400\">What happened at Splunk\u2019s .conf23?\u00a0<\/span><\/h2>\n<p><span style=\"font-weight: 400\">The conference was huge, with more than 7000 attendees, 1500 partners and 40 sponsors. Along with educational workshops and keynote speeches, there were over 200 technical breakout sessions. All these offerings work to provide attendees with technical and theoretical knowledge to bring back to their teams. This will boost digital resilience and extend the benefits to their customers.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Gary Steele, president and CEO of Splunk said ahead of the event\u2026<\/span><\/p>\n<blockquote><p><span style=\"font-weight: 400\">&#8220;Splunk is celebrating 20 years of helping organizations around the world keep their digital systems secure and reliable,&#8221; \u2026\u00a0 &#8220;To mark the occasion, we will unveil exciting new AI-enhanced products and other powerful innovations across security and observability to thousands of our customers and partners at .conf23.&#8221;<\/span><\/p><\/blockquote>\n<p><span style=\"font-weight: 400\">Representatives from FedEx, Carnival and IKEA were all in attendance. And VMware came along to share their latest security and observability products. At the start of the conference Splunk customers and executives came together to demonstrate their unified security and observability platform. <\/span><a href=\"https:\/\/www.splunk.com\/en_us\/products\/enterprise-security.html\"><span style=\"font-weight: 400\">Splunk Enterprise Security<\/span><\/a><span style=\"font-weight: 400\"> allows businesses to manage their security risks with data-driven insights, ML-powered threat detection and full visibility.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400\">.conf23 Highlights\u00a0<\/span><\/h2>\n<p><span style=\"font-weight: 400\">One of the stand out educational sessions of the event was run by <\/span><a href=\"https:\/\/www.prnewswire.com\/news-releases\/cardinalops-to-present-at-splunk-conf23-user-conference-on-new-approach-to-measuring-detection-posture-using-mitre-attck-301873760.html\"><span style=\"font-weight: 400\">CardinalOps<\/span><\/a><span style=\"font-weight: 400\"> about MITRE ATT&amp;CK, a group of over 500 techniques used by threat groups including APT28, the Lazarus Group, FIN7, and LAPSUS$. It\u2019s thought that already 89% of organisations use these methods to mitigate security risks, so this talk tapped into a vital topic.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">CardinalOps\u2019, MITRE ATT&amp;CK Security Layers solves several prevalent operational problems, extends protections and provides users with \u201cdetection-in-depth\u201d. The new tool will allow users to quickly find blind spots, which can ultimately be rectified.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">The world of business is becoming more and more digitised which brings with it many unprecedented security risks. Company leaders need to be adaptable to these changes. The solutions put forward by .conf23 speakers and partners would help enable this development.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Jon Oltsik from TechTarget\u2019s Enterprise Strategy Group said\u2026<\/span><\/p>\n<blockquote><p><span style=\"font-weight: 400\">&#8220;As the digital landscape evolves, organizations really need a holistic approach to security and observability. A comprehensive strategy can help security teams safeguard their valuable assets, detect and address potential threats proactively, ensure regulatory compliance, maintain operational continuity and build trust among their stakeholders,&#8221; &#8230; \u201cSplunk&#8217;s latest innovations can help, as they are designed to empower and speed up IT operations, security operations and engineering teams&#8217; work and collaboration for detecting, investigating and remediating security issues.\u201d<\/span><\/p><\/blockquote>\n<h2><span style=\"font-weight: 400\">Conclusion<\/span><\/h2>\n<p><span style=\"font-weight: 400\">Splunk\u2019s inspiring .conf23. Bought together thousands of people keen to learn about cybersecurity and observability. As all businesses now rely on the digital world, executives will benefit from engaging with these discussions. Not just to handle their own companies&#8217; security risks but to find new ways of working in our changing world. Will you be at Splunk\u2019s conference next year? <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Splunk, a leader in cybersecurity and observability hosted its .conf23 user conference in Las Vegas last week. If you couldn\u2019t make the trip for their 20th anniversary, fear not! We have all the latest here.\u00a0 What happened at Splunk\u2019s .conf23?\u00a0 The conference was huge, with more than 7000 attendees, 1500 partners and 40 sponsors. Along [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":14667,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[11,100,60],"tags":[],"class_list":{"0":"post-14666","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-compliance-and-risk","8":"category-cyber-security","9":"category-security"},"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/techinsight.net\/wp-json\/wp\/v2\/posts\/14666"}],"collection":[{"href":"https:\/\/techinsight.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techinsight.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techinsight.net\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/techinsight.net\/wp-json\/wp\/v2\/comments?post=14666"}],"version-history":[{"count":0,"href":"https:\/\/techinsight.net\/wp-json\/wp\/v2\/posts\/14666\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techinsight.net\/wp-json\/wp\/v2\/media\/14667"}],"wp:attachment":[{"href":"https:\/\/techinsight.net\/wp-json\/wp\/v2\/media?parent=14666"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techinsight.net\/wp-json\/wp\/v2\/categories?post=14666"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techinsight.net\/wp-json\/wp\/v2\/tags?post=14666"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}