Andrew Wurster | Splunk .conf2014
Best viewed at http://vinja.tv/jJDWlM1H. 01. Andrew Wurster - Network Consulting Engineer at Cisco - Visits #theCUBE!. (00:52) 02. What's The VIbe Like At Splunk.conf Event?. (01:14) 03. What's The General Feeling On Security And Big Data?. (01:54) 04. What Is The Cyber Range Project About?. (03:12) 05. Being Responsive To Customers And The Real World. (04:13) 06. The Evolution Of Security And Threat Detection. (05:13) 07. Cisco And Splunk. (06:28) 08. Data Integration With Splunk. (08:55) 09. Unified Servers And DevOps. (11:01) 10. Trade-offs Between Security And Usability. (12:45) 11. Security Conversations And DevOps Practitioners. (14:04) 12. The Craziest, Good or Bad, Use Of Security Apps. (15:33) 13. Machine Learning Meeting Human Curation. (16:57) 14. The Right Level Of Information. (18:16) 15. Getting The Data Ready For Analysis. (18:52) 16. When Best To Share Knowledge Of A Breach. (19:25) Track List created with http://www.vinjavideo.com. --- --- Andrew Wurster, Cyber Range, at Splunk.conf 2014 with John Furrier and Jeff Kelly @theCUBE #splunkconf he team up between Splunk Inc. and Cisco Systems, Inc meets the gap in many products by taking “bits of info from disparate systems” and then putting it all together in one cohesive overview, explained Andrew Wurster. The Networking Consulting Engineer at Cisco’s Cyberarrange recalled his company’s earlier experience reviewing security events from its customers, as they requested help from Cisco. Aiding the networking firm in its response tactics to customer requests was Splunk. In a live interview with theCUBE at Splunk’s annual conference, Wurster detailed the evolution of attackers’ infiltration techniques: they begin by “getting into one system and then invading others.” Furthermore, Wurster pointed out, “customers are actually scared.” Security breaches are occurring often and can become big news, but companies have smaller budgets with which to combat these threats. “It’s the problem of our time,” he said. Although Splunk doesn’t market itself as a security company, its platform lends itself to security systems extremely well, as it begins at an affordable price point and is ideal for monitoring many systems at once. Cisco and Splunk now need to figure out how to balance customer experience with strenuous security. A big factor, Wurster said, is being “smarter about where the data is living.” Wurster proposed that to balance between experience and security, companies could consider giving their customers a “kill switch,” which can wipe a mobile device or laptop they think has been compromised.