We just sent you a verification email. Please verify your account to gain access to
Splunk.conf 2014 | Las Vegas. If you don’t think you received an email check your
spam folder.
In order to sign in, enter the email address you used to registered for the event. Once completed, you will receive an email with a verification link. Open this link to automatically sign into the site.
Register For Splunk.conf 2014 | Las Vegas
Please fill out the information below. You will recieve an email with a verification link confirming your registration. Click the link to automatically sign into the site.
You’re almost there!
We just sent you a verification email. Please click the verification button in the email. Once your email address is verified, you will have full access to all event content for Splunk.conf 2014 | Las Vegas.
I want my badge and interests to be visible to all attendees.
Checking this box will display your presense on the attendees list, view your profile and allow other attendees to contact you via 1-1 chat. Read the Privacy Policy. At any time, you can choose to disable this preference.
Select your Interests!
add
Upload your photo
Uploading..
OR
Connect via Twitter
Connect via Linkedin
EDIT PASSWORD
Share
Forgot Password
Almost there!
We just sent you a verification email. Please verify your account to gain access to
Splunk.conf 2014 | Las Vegas. If you don’t think you received an email check your
spam folder.
In order to sign in, enter the email address you used to registered for the event. Once completed, you will receive an email with a verification link. Open this link to automatically sign into the site.
Sign in to gain access to Splunk.conf 2014 | Las Vegas
Please sign in with LinkedIn to continue to Splunk.conf 2014 | Las Vegas. Signing in with LinkedIn ensures a professional environment.
Are you sure you want to remove access rights for this user?
Details
Manage Access
email address
Community Invitation
Andrew Wurster | Splunk .conf2014
Best viewed at http://vinja.tv/jJDWlM1H.
01. Andrew Wurster - Network Consulting Engineer at Cisco - Visits #theCUBE!. (00:52)
02. What's The VIbe Like At Splunk.conf Event?. (01:14)
03. What's The General Feeling On Security And Big Data?. (01:54)
04. What Is The Cyber Range Project About?. (03:12)
05. Being Responsive To Customers And The Real World. (04:13)
06. The Evolution Of Security And Threat Detection. (05:13)
07. Cisco And Splunk. (06:28)
08. Data Integration With Splunk. (08:55)
09. Unified Servers And DevOps. (11:01)
10. Trade-offs Between Security And Usability. (12:45)
11. Security Conversations And DevOps Practitioners. (14:04)
12. The Craziest, Good or Bad, Use Of Security Apps. (15:33)
13. Machine Learning Meeting Human Curation. (16:57)
14. The Right Level Of Information. (18:16)
15. Getting The Data Ready For Analysis. (18:52)
16. When Best To Share Knowledge Of A Breach. (19:25)
Track List created with http://www.vinjavideo.com.
--- ---
Andrew Wurster, Cyber Range, at Splunk.conf 2014 with John Furrier and Jeff Kelly
@theCUBE
#splunkconf
he team up between Splunk Inc. and Cisco Systems, Inc meets the gap in many products by taking “bits of info from disparate systems” and then putting it all together in one cohesive overview, explained Andrew Wurster. The Networking Consulting Engineer at Cisco’s Cyberarrange recalled his company’s earlier experience reviewing security events from its customers, as they requested help from Cisco. Aiding the networking firm in its response tactics to customer requests was Splunk.
In a live interview with theCUBE at Splunk’s annual conference, Wurster detailed the evolution of attackers’ infiltration techniques: they begin by “getting into one system and then invading others.” Furthermore, Wurster pointed out, “customers are actually scared.” Security breaches are occurring often and can become big news, but companies have smaller budgets with which to combat these threats. “It’s the problem of our time,” he said.
Although Splunk doesn’t market itself as a security company, its platform lends itself to security systems extremely well, as it begins at an affordable price point and is ideal for monitoring many systems at once.
Cisco and Splunk now need to figure out how to balance customer experience with strenuous security. A big factor, Wurster said, is being “smarter about where the data is living.” Wurster proposed that to balance between experience and security, companies could consider giving their customers a “kill switch,” which can wipe a mobile device or laptop they think has been compromised.