It’s Life, Jim, But Not As We Know It… Detecting Anomalies with Splunk Enterprise Security

Tags:

Explaining and demonstrating how the CyberSecurity Operations Center (CSOC) uses Splunk Enterprise Security to monitor University logs and watch for anomalous and suspicious behavior that could indicate an attacker.  About this event:  Presenters: Track: Reroute to Efficiency — Streamline processes at warp speed to reduce complexity and improve operations. Experience Needed: Beginner Additional Keywords: security, […]

Where and When:

November 5, 2025 from 11:00 am to 11:45 am

    Automating Incident Response with Splunk and SOAR

    Tags: , ,

    The Technology Services security team will provide visibility into some things we are watching for in Splunk, and demonstrate some ways we are leveraging Splunk SOAR automation to seamlessly respond to and resolve minor incidents. There will also be information on how other groups on campus may be able to use SOAR for similar use […]

    Ransomware: What You Need to Know as IT Pro

    Tags: , , ,

    Ransomware is scary! In the last few years, ransomware has risen seemingly out of nowhere to become one of the greatest cyber threats facing organizations around the world. Come learn about what the Incident Response team of the Cyber Security Operations Center has been doing to prepare us for the worst-case scenario. We will cover […]

    Protecting the Campus Network with Zeek and Null Routing

    Tags: , ,

    Zeek is a Network Security Monitoring (NSM) tool used in combination with our Null Router to identify and sinkhole malicious traffic at our network border. This talk will provide an overview of how we use these tools to monitor and protect our network and users.