Close Menu
geekfence.comgeekfence.com
    What's Hot

    Self-managed observability: Running agentic AI inside your boundary 

    March 9, 2026

    Can AI Replace Excel for Vendor Statement Reconciliation?

    March 9, 2026

    Cisco Live Amsterdam 2026: XDR + Splunk ES

    March 9, 2026
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»Cloud Computing»Cisco Live Amsterdam 2026: XDR + Splunk ES
    Cloud Computing

    Cisco Live Amsterdam 2026: XDR + Splunk ES

    AdminBy AdminMarch 9, 2026No Comments6 Mins Read0 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Cisco Live Amsterdam 2026: XDR + Splunk ES
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Building on the lessons learned in the Security Operations Center (SOC) at major events, we challenged ourselves to build something new at Cisco Live Amsterdam 2026, a closed-loop integration with Cisco XDR and Splunk Enterprise Security.

    Planning a successful SOC begins with strong collaboration with the Network Operations Center (NOC). It also began with a focus, using the Splunk Security Maturity Methodology (S2M2).

    The core missions of the SOC remain:

    • Protect: Safeguard the network from threats and attacks, both internal and external
    • Educate: Inform and engage attendees through SOC tours and blog content, and our white paper
    • Innovate: Develop and implement new integrations, processes, workflows, and automations
    EMEA 2026 SOC tours

    Harnessing the Power of Splunk Security

    A major goal for EMEA 2026 was breaking down the silos between “triage / investigating” and “threat hunting / incident response.”

    By embedding Splunk Security Integration Engineers directly into the SOC, we curated specific workflows that allowed Tier 1 interns and Tier 2 analysts to perform complex investigations that were previously the domain of Tier 3 responders.

    Configurations and other data were ready to go from previous events, including dashboards in Splunk, from the innovations for the National Football League Super Bowl LX SOC.

    CL emea soc dashboard scaled internal

    We refined the SOC Manager dashboard in Splunk from the experience at the Super Bowl SOC, showing the Incidents generated from detections in the security sources, and the status of the incidents, including escalations to Splunk Enterprise Security (ES).

    CL EMEA splunk soc dashboard

    The Splunk Security Product Labs team worked to utilize the power of the Cisco XDR correlation engine, to bring Splunk ES Risk index logs as Sources into the XDR Data Analytics Platform. Those logs were correlated with other detections to produce Incidents for Triage and Investigation by Tier 1 /2 SOC analysts.

    XDR risk correlation

    The integration between Cisco XDR and Splunk ES delivers a seamless experience for security operations teams by combining native XDR detections with Splunk’s extensive data backend and custom OCSF detections. Key innovations include:

    • Rapid Onboarding: New SOC analysts can be trained on XDR in under an hour, including integration pivot points with Splunk and Endace packet capture.
    • Unified Incident Management: Detections from both Cisco XDR and Splunk were correlated within XDR, allowing analysts to see the source of detections in incidents, but maintaining a consistent user experience. This reduces the need for retraining before effectiveness in a mature SOC.
    • Efficient Analyst Workflow: Tier 1/2 analysts triaged and investigated incidents in XDR, with the ability to pivot to Splunk logs and Endace packet data. When escalation is needed, enriched incident data is automatically sent to Splunk ES for Tier 3 analysts to continue investigations in Mission Control.
    • Closed-Loop Automation: Incident status was automatically updated in XDR when the case was resolved in Splunk ES, closing the loop and ensuring synchronized records.
    XDR ES Pivot to mission control
    • Learning & Collaboration: Tier 1/2 analysts had role based access to Splunk ES via Duo Directory, empowering them to view the Tier 3 investigation notes and findings, and upleveling their skills.
    XDR work log notes and status closed scaled
    • Openness & Customization: The integration leverages the open architecture of both Cisco XDR and Splunk, supporting custom detections and flexible workflows, as proven in high-profile SOC deployments.

    This innovation enables security operations centers to maximize detection coverage, streamline incident response, reduce training overhead, and foster analyst growth, through tightly integrated, automated workflows.

    The Deployment: SOC in a Box

    The SOC was successfully deployed in just 12 hours over 1 ½ days. This speed was not accidental; it was architectural. We utilized our portable “SOC in a Box”, a pre-configured hardware stack designed to be delivered in advance to the venue, connected to the NOC and immediately began producing actionable telemetry.

    Key factors enabling this rapid setup included:

    • Pre-validated Data Paths: Instant connectivity between the Cisco Live NOC, Splunk Enterprise Security and the Cisco Security Cloud.
    • Battle-Tested Innovation: We integrated advanced security practices developed while safeguarding the Black Hat network, recognized as the world’s most hostile environment.
    • Proven Workflows: We drew upon expertise and playbooks refined at the Super Bowl LX, RSAC, GovWare and prior Cisco Live SOCs.
    SOC in a box diagram and photo

    The SOC Architecture: A “System of Systems”

    The Amsterdam SOC was designed to overcome specific event constraints, such as the inability to install endpoint agents on attendee devices (BYOD) and the need to detect malware in encrypted traffic.

    The Visibility Layer: The SOC team worked with the NOC to connect the ‘SOC in the Box’ and Cisco Secure Access for DNS security. We received a Switched Port Analyzer (SPAN) feed of network traffic.

    The Investigation Layer: We deployed the EndaceProbe packet capture platform to record all network traffic. This allowed us to pivot from a Splunk alert directly to full packet capture (PCAP) to validate investigative hypotheses. Endace also generated Zeek logs for Splunk Enterprise Security (ES), while file content was reconstructed on the wire and streamed to Splunk Attack Analyzer and Cisco Secure Malware Analytics for sandboxing.

    The Analysis & Identity Layer:

    • Splunk Cloud and Splunk ES served as the SOC platform, aggregating risk scores and normalizing data into the Common Information Model (CIM).
    • Cisco XDR acted as investigation visualization tool, using AI to confirm threats faster with Instant Attack Verification, enriched with threat intelligence provided by Cisco Talos, and licenses donated by alphaMountain, Pulsedive, and StealthMole, along with community sources.
    EMEA soc architecture
    • Duo Directory and Identity Intelligence provided the identity plane, securing access to our tools via Single Sign-On and ensuring our analysts were authenticated and authorized within minutes of joining the shift.
    DUO SSO

    The Statistics

    Statistics are always a popular part of the SOC Tours. Below are the stats from this year’s event.

    Year 2026
    Attendees (Cisco Live) 21,000
    Total packets captured (Endace) 130 billion
    Total logs captured (Splunk) 6.96 billion
    Total sessions (Endace) 911.3 million
    Total unique devices (Endace in Splunk) 32,434
    Total packets written to disk (Endace) 120 TBs
    Total logs written to cloud (Splunk) 3.233 TBs
    Peak bandwidth utilization (Endace) 7 Gbps
    DNS Requests (Cisco Secure Access) 105 million / 29.3k blocked
    Total clear text username/passwords
    (Endace)
    5,634
    Unique devices / accounts with clear text
    usernames / passwords (Endace)
    575
    Files sent for malware analysis (Endace) – 1.7m file objects reconstructed by Endace.
    – 55,471 sent to Splunk Attack Analyzer
    – 45,514 sent to Secure Malware Analytics
    SOC tour

    SOC Findings and Lessons Learned

    The SOC team focuses on continuous innovation—the “OODA loop” of observing, orienting, deciding, and acting. We take time to document our experiences for the edification of the community.

    Check out the deep-dive technical blogs below from the engineers who worked inside the SOC:

    Acknowledgements

    A heartfelt thank you to the engineers whose expertise made the first Cisco Live Amsterdam 2026 SOC a tremendous success.

    SOC team

    Network Operations Center Liaisons

    • Remco Kamerman, Luke Hebditch, Mark Bremner and Scott Neuman

    Cisco Security and Splunk SOC Team

    • SOC in a Box: Adi Sankar
    • Splunk Security Integrations: Paul Pelletier and Kenneth Bouchard, with Josh Wilson and Duane Waddle
    • Splunk Threat Researchers: Nasreddine Bencherchali and Paul Pang
    • Breach Protection Suite: Mark Pleunes, Ibrahim Yusuf, Piotr Jarzynka, Matt Vander Horst, Yannis Steiakogiannakis and Eric Rennie, with Bilal Qamar
    • User Protection Suite: Aaron Woland
    • Firewall and Security Cloud Control: Adam Kilgore and Christopher Grabowski

    Endace SOC Team

    • Co-SOC Leader: Cary Wright Endace Engineering: Owen Gallagher, Sundarram Paravastu and Sam Brockelsby

    We’d love to hear what you think! Ask a question and stay connected with Cisco Security on social media.

    Cisco Security Social Media

    LinkedIn
    Facebook
    Instagram





    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    CSP: Future-Proof Growth: Beyond Basic Hosting: 5 VCF Deployment Models

    March 8, 2026

    Introducing OpenClaw on Amazon Lightsail to run your autonomous private AI agents

    March 7, 2026

    Microsoft Expands Windows 365 with New Cloud PC Devices from ASUS and Dell

    March 6, 2026

    Samsung AI-RAN demo signals telecom cloud shift at MWC 2026

    March 5, 2026

    An ode to craftsmanship in software development

    March 4, 2026

    A Retrospective on Workload Security

    March 3, 2026
    Top Posts

    Hard-braking events as indicators of road segment crash risk

    January 14, 202619 Views

    Understanding U-Net Architecture in Deep Learning

    November 25, 202518 Views

    How to integrate a graph database into your RAG pipeline

    February 8, 202610 Views
    Don't Miss

    Self-managed observability: Running agentic AI inside your boundary 

    March 9, 2026

    When AI systems behave unpredictably in production, the problem rarely lives in a single model…

    Can AI Replace Excel for Vendor Statement Reconciliation?

    March 9, 2026

    Cisco Live Amsterdam 2026: XDR + Splunk ES

    March 9, 2026

    Can the Security Platform Finally Deliver for the Mid-Market?

    March 9, 2026
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    Self-managed observability: Running agentic AI inside your boundary 

    March 9, 2026

    Can AI Replace Excel for Vendor Statement Reconciliation?

    March 9, 2026

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2026 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.