Computer - Credential Leak
JULY 17-19, 2023 | LAS VEGAS, NV

Discover the power of Intelligence at Splunk .conf23

Come see us at Splunk .conf23 this year where we will be sharing cutting-edge insights and innovative solutions to enhance your cybersecurity strategy. We have a limited number of consultation sessions available with Recorded Future experts, make sure to claim your spot now!

Where to find Recorded Future at .conf23

  • Featured Session | Tuesday, July 18
    SEC1633C | 10:30 AM - 11:15 AM PDT
    Rock Em' SOC Em': Arming Security Analysts to Defeat Adversaries by Hunting for Threats with Sigma Rules

    Cam Thorpe, Senior Manager, Professional Services - Recorded Future

    Justin Grosfelt, Principle Malware Reverse Engineer - Recorded Future

    Prior to dropping end-stage malware, threat actors escalate their attack by establishing persistence, escalating privileges or moving laterally. These tools leave log or file-based artifacts, allowing defenders to detect them. This session will demonstrate how to use Sigma rules, Splunk® Enterprise, Splunk® Enterprise Security, and Splunk® SOAR to detect and hunt malware-related activities. We’ll also discuss how our team investigates malware variants, identifies tools and tactics, techniques, and procedures (TTPs), and writes Sigma rules to catch them.

    Skill Level: Intermediate

    Roles: Security Analyst/Manager, SOC Manager/Director, Threat Researcher/Hunter

    Products/Services: Splunk® Enterprise, Splunk® Enterprise Security, Splunk® Security, Orchestration, Automation and Response (SOAR)

  • source=*Pavilion | T310
    Visit the Recorded Future booth T310

    Get a close-up look at the new functionality with our integrations with Splunk Enterprise, Splunk Enterprise Security, and Splunk SOAR. We will also have copies of our exclusive research on hand to review with you. 

    Join our session in the source=*Pavilion on Tuesday at 5 PM

    Speed Alert Triage with Operationalized Threat Intelligence in Your Security Workflows

     

Ask the Expert

Schedule one-on-one time

Use the calender below to secure your spot with our experts to discuss one of the following topics. By pre-booking your appointment, you'll be eligible to receive a Summer Survival Kit that includes a Camelback Cooler, socks and more! 

      • Threat Hunt in the SOC with Sigma Rules
      • Optimize Risk-Based Alerting with Recorded Future
      • Shift from Reactive to Proactive with Recorded Future and Splunk
      • Discover and Defend Your Changing Attack Surface 
 

Get Your Intelligence for Splunk Kit

  • We hear it all the time, SOC teams are stretched thin.

    Researching thousands of raw data points is often a manual and time-consuming process, but Recorded Future has helped over 1,500 clients to triage alerts faster, detect more threats, and supercharge their Splunk environment. We’ve taken what we’ve learned along the way and compiled it into a bundle of resources–The Intelligence for Splunk Kit–to help you leverage our proprietary data and best practices.

    The kit includes:

    Report: AWS, Recorded Future, and Splunk: Better Security Operations Together
    Video: Operationalizing Threat Intelligence
    Video: Expect More From Your Threat Intelligence
    Guide: Intelligence Drives Faster, Smarter Decisions
    Guide: Security Intelligence Handbook

    These resources will help you develop and operationalize an intelligence-led security program, identify false positives, prioritize events, and automate alert response, up-level your security program by connecting your SIEM and SOAR to retro-threat hunt, and more.

    Get Your Kit Today