Scott Plichta, Corporation Service Company, at Splunk.conf 2014 with John Furrier and Jeff Kelly
When on a full Splunk Inc. network, the Corporation Service Company was able to diagnose and get the root cause of a security incident in under three hours. On a network without Splunk, the same precess took three days. When relaying this anecdote in a live interview with theCUBE at this year’s Splunk conference, Scott Plichta, CISO of the Corporation Service Company, explained the process what so much quicker because “Splunk brings everything under a single pane of glass,” which makes it faster and simpler to identify the cause of the problem.
The ability to resolve security incidents quickly meant that the Corporation Service Company saw little disruption in its business transactions. Because Splunk offered a comprehensive view of the entire system, Plichta observed business processes were interrupted “only when it involved remediation action.”
While he cautioned that there are certain attacks that companies can’t be prepared for, Plichta stressed that Splunk dashboards make it easy to see whether patches work throughout the system.
Cloud offers something of a security “reset” because it has no perimeter, Plichta said. As cloud adoption becomes more prevalent, he believes it will force a reexamination of security procedures and practices throughout the tech industry.
Forgot Password
Almost there!
We just sent you a verification email. Please verify your account to gain access to
Splunk.conf 2014 | Las Vegas. If you don’t think you received an email check your
spam folder.
In order to sign in, enter the email address you used to registered for the event. Once completed, you will receive an email with a verification link. Open this link to automatically sign into the site.
Register For Splunk.conf 2014 | Las Vegas
Please fill out the information below. You will recieve an email with a verification link confirming your registration. Click the link to automatically sign into the site.
You’re almost there!
We just sent you a verification email. Please click the verification button in the email. Once your email address is verified, you will have full access to all event content for Splunk.conf 2014 | Las Vegas.
I want my badge and interests to be visible to all attendees.
Checking this box will display your presense on the attendees list, view your profile and allow other attendees to contact you via 1-1 chat. Read the Privacy Policy. At any time, you can choose to disable this preference.
Select your Interests!
add
Upload your photo
Uploading..
OR
Connect via Twitter
Connect via Linkedin
EDIT PASSWORD
Share
Forgot Password
Almost there!
We just sent you a verification email. Please verify your account to gain access to
Splunk.conf 2014 | Las Vegas. If you don’t think you received an email check your
spam folder.
In order to sign in, enter the email address you used to registered for the event. Once completed, you will receive an email with a verification link. Open this link to automatically sign into the site.
Sign in to gain access to Splunk.conf 2014 | Las Vegas
Please sign in with LinkedIn to continue to Splunk.conf 2014 | Las Vegas. Signing in with LinkedIn ensures a professional environment.
Are you sure you want to remove access rights for this user?
Details
Manage Access
email address
Community Invitation
Scott Plichta | Splunk .conf2014
Scott Plichta, Corporation Service Company, at Splunk.conf 2014 with John Furrier and Jeff Kelly
When on a full Splunk Inc. network, the Corporation Service Company was able to diagnose and get the root cause of a security incident in under three hours. On a network without Splunk, the same precess took three days. When relaying this anecdote in a live interview with theCUBE at this year’s Splunk conference, Scott Plichta, CISO of the Corporation Service Company, explained the process what so much quicker because “Splunk brings everything under a single pane of glass,” which makes it faster and simpler to identify the cause of the problem.
The ability to resolve security incidents quickly meant that the Corporation Service Company saw little disruption in its business transactions. Because Splunk offered a comprehensive view of the entire system, Plichta observed business processes were interrupted “only when it involved remediation action.”
While he cautioned that there are certain attacks that companies can’t be prepared for, Plichta stressed that Splunk dashboards make it easy to see whether patches work throughout the system.
Cloud offers something of a security “reset” because it has no perimeter, Plichta said. As cloud adoption becomes more prevalent, he believes it will force a reexamination of security procedures and practices throughout the tech industry.