Reduce risk to core event services with fast detection and triage, plus targeted response that prioritizes availability.
Share insights with stakeholders, de-escalate false alarms quickly, and reinforce clear policy and response paths in a multi-tenant environment.
Use events as a real-world proving ground to refine detections, workflows, integrations, and automations, then carry improvements into products and content.
Quantify risk and value for high-visibility events and venues.
Run repeatable triage and investigation under high noise and limited endpoint control.
Rapidly operationalize a network-centric security posture at event scale.
Protect critical services, such as registration, badging, apps, and Wi-Fi.
Video
Watch this behind-the-scenes tour and walk-through of the event SOC.
Podcast
This interview features lessons learned while securing one of the highest-noise event networks.
Metrics shown are based on Cisco Live Americas 2025.
Wire data captured for investigation and validation during the event window.
A total of 36.6 TB packet captures (PCAPs) written to disk.
Network metadata at scale for hunting, correlation, and fast pivots when payloads are encrypted.
Security telemetry streamed to cloud analytics for triage and correlation across tools.
High-device churn and transient identities, handled with network-centric context and segmentation.
Domain Name System (DNS) security leveraged to spot suspicious resolution, beaconing, and newly seen domains.
Files detected from traffic and enriched for investigation when endpoints are unmanaged.
Suspicious files and URLs detonated to extract indicators, verdicts, and enrichment.
Get the full guide with reference architecture, operating model, and best practices for running a rapidly deployed SOC under real-world constraints.
Connect with sales, support, and partner services to get the very most out of your Splunk- and Cisco-powered SOC.