Security Workshops

Premium Workshops Designed by SP6 Engineers

Splunk 2023-2024 Partner of the Year Award Winner

A Defined Path Toward Maturing Your Cyber Defense Program

Splunk has thousands of out-of-the-box security detections. Many organizations aren’t certain which detections should be deployed, or how to prioritize the implementation of these detections. SP6’s Security Use Case Workshop is a one-week, hands-off-keyboard exercise designed to answer these questions. Security workshops allow your organization to identify and prioritize your cybersecurity detections, in a manner that is specific to your organization and threats to your specific industry. The workshops also identify the data sources necessary to inform these detections.

SP6 security workshops allow you to discover and catalog security detection rules for your organization, prioritize these security use cases based on maturity, and analyze and document the data sources required to build detection rules. The result? Your organization has a defined path toward maturing your cyber defense program.

Four Objective-Driven Premium Workshops to Kickstart the Process

Security Use Case Workshop

Receive a comprehensive, MITRE ATT&CK-based roadmap for building security event detections and prioritizing use cases.

SIEM Replacement Workshop

Receive a detailed deployment plan for replacing an older SIEM with Splunk Enterprise Security.

Security Maturity Workshop

Receive a complete review of your entire security environment, followed by a prioritized remediation plan.

Architecture Development Workshop

Receive expert guidance on how to efficiently deploy Splunk in a complex environment.

Benefits to Your Organization

Primary Benefits
Secondary Benefits

NOTE: The required infrastructure is dependent upon the number of correlation searches occurring in your SIEM, which in turn are dependent upon the use cases that feed those correlation searches.

NOTE: Detailed requirements guide project estimation and vary from organization to organization as determined by: 

  • The number of detection rules selected 
  • Data sources that these detection rules are dependent upon 
  • Amount of custom versus out-of-the-box security use cases 
  • Several other factors

See How a Security Use Case Workshop Would Benefit Your Organization

Don't Take Our Word for It...

Schedule a quick call with one of our Splunk experts!