A Journey Through Security Maturity — Splunk Webinar Series
Navigating you through the Stages of Splunk's Security Maturity Model.
Setting the Scene
In today's constantly changing threat landscape, it is essential for organisations to regularly evaluate and enhance their security posture.
Whether you are starting out on your journey or joining as a seasoned pro, our dedicated webinar series will give you a unique insight into Splunk's approach to security maturity.
Explore how it can help improve your organisation's security posture, what data should be prioritised and what best steps your organisation should take to ensure systematic security maturity.
Meet the Experts
Ben Marrable,
Security Strategist (CISSP) at Somerford
Stew Lowe,
Splunk Security Expert (CISSP)
About the Series
Webinar #1: Years 1-2 of Security Operations, What to do with SecOps? (Ft. Splunk Security Essentials)
Hosted by Somerford's Ben Marrable, Security Strategist (CISSP)
> Introduction: The importance of security maturity mapping and how Splunk can help
> The Splunk Security Maturity Model: Overview of years 1 and 2 of security operations, and examining stages of security maturity
> How to use Splunk to assess your organisation's current security posture to utilise best practices and strategies
> Where Splunk's security portfolio fits across the maturity model - Ft. Splunk Security Essentials
> Introduction: The importance of security maturity mapping and how Splunk can help
> The Splunk Security Maturity Model: Overview of years 1 and 2 of security operations, and examining stages of security maturity
> How to use Splunk to assess your organisation's current security posture to utilise best practices and strategies
> Where Splunk's security portfolio fits across the maturity model - Ft. Splunk Security Essentials
Webinar #2: Years 3-4 of Security Operations, Enabling Monitoring & Alerting (Ft. Splunk RBA)
Hosted by Somerford's Ben Marrable, Security Strategist (CISSP) at Somerford
> Introduction: The importance of security maturity mapping and how Splunk can help
> The Splunk Security Maturity Model: Overview of years 2 and 3 of security operations, and examining stages of security maturity
> How to use Splunk to assess your organisation's current security posture to utilise best practices and strategies
> Where Splunk's security portfolio fits across the maturity model - Ft. Splunk Risk-Based Alerting (RBA)
> Introduction: The importance of security maturity mapping and how Splunk can help
> The Splunk Security Maturity Model: Overview of years 2 and 3 of security operations, and examining stages of security maturity
> How to use Splunk to assess your organisation's current security posture to utilise best practices and strategies
> Where Splunk's security portfolio fits across the maturity model - Ft. Splunk Risk-Based Alerting (RBA)
Webinar #3: Years 5+ of Security Operations, Achieving Real-Time Automation (Ft. Splunk SOAR)
Hosted by Stew Lowe, Splunk Security Expert (CISSP)
> Introduction: The importance of security maturity mapping and how Splunk can help
> The Splunk Security Maturity Model: Overview of years 3 and 4 of security operations, and examining stages of security maturity
> How to use Splunk to assess your organisation's current security posture to utilise best practices and strategies
> Where Splunk's security portfolio fits across the maturity model - Ft. Splunk Security, Operation, Automation and Response (SOAR)
> Introduction: The importance of security maturity mapping and how Splunk can help
> The Splunk Security Maturity Model: Overview of years 3 and 4 of security operations, and examining stages of security maturity
> How to use Splunk to assess your organisation's current security posture to utilise best practices and strategies
> Where Splunk's security portfolio fits across the maturity model - Ft. Splunk Security, Operation, Automation and Response (SOAR)