Splunk at RSAC™ 2025: Helping Users Build the SOC of the Future

Security JK Lialias

It’s almost time once again for RSA Conference. As you’re finishing up your travel arrangements and plans for the trip to sunny San Francisco and the familiar halls of the Moscone Center, we hope you will take some time to make Splunk a part of your RSAC™ 2025 experience.

Splunk is committed to providing SecOps teams with cutting edge solutions that help improve digital resilience. Our latest advancements in Data Management, continuous innovation for our market-leading SIEM, and more, make it easier than ever for our customers to maximize their data value to optimize security outcomes. From the stage to the show floor, our goal is to arm security professionals with the knowledge and tools they need to help build the SOC of the Future for a more secure tomorrow.

We’ll have plenty of new info to share on the latest and greatest innovations in Splunk’s expansive security offerings at RSAC™ this year, including what’s to come in the next major updates for products like Splunk Enterprise Security as well as recent developments and updates for Splunk SOAR, Splunk Attack Analyzer, Splunk Asset and Risk Intelligence, and more.

Splunk is once again proud to be a Platinum Plus sponsor at RSAC™ 2025 where we will be showcasing how our security solutions can help our customers build the SOC of the Future. There’s no shortage of ways for you to connect and engage with Splunk at RSA Conference 2025. Here are some of the highlights you won’t want to miss:

Day 1

Day 2

Day 3

General

Related Articles

Safe Passage: Seamless Transition Path for IBM QRadar Customers
Security
4 Minute Read

Safe Passage: Seamless Transition Path for IBM QRadar Customers

The SOC is where it all goes down and where dedicated SecOps teams work tirelessly to protect every digital corner of an organization.
You Bet Your Lsass: Hunting LSASS Access
Security
13 Minute Read

You Bet Your Lsass: Hunting LSASS Access

Dive in as the Splunk Threat Research Team shares how Mimikatz, and a few other tools found in Atomic Red Team, access credentials via LSASS memory.
Beyond The Click: Unveiling Fake CAPTCHA Campaigns
Security
13 Minute Read

Beyond The Click: Unveiling Fake CAPTCHA Campaigns

Learn how clipboard hijacking delivers malware and explore tools like ClickGrab & PasteEater for robust defense strategies.