.conf2014 Highlight Series: Detecting Fraud and Suspicious Events Using Risk Scoring
.conf2015 registration is open!
We’re excited to continue our series of .conf2014 #TBT highlights, especially as we get closer to .conf2015: The 6th Annual Splunk Worldwide Users’ Conference in Las Vegas this September. This week we revisit Robert Perdues’s presentation about how Splunk can be used to detect fraud and suspicious events using risk scoring.
This session showcases how Splunk can be used to build a risk scoring engine designed to detect fraud and other suspicious activities. This presentation includes a real-world fraud detection use case, a detailed description of the searches and lookups, which drive risk scoring, as well as other cyber security related applications of risk scoring.
For the full recording, check out Detecting Fraud and Suspicious Events Using Risk Scoring.
Make sure to register for .conf2015 today and be on the lookout for more of our #TBT .conf highlights as we get closer to .conf2015: The 6th Annual Splunk Worldwide Users’ Conference in Las Vegas in September.