This document discusses operationalizing security intelligence through Splunk. It begins with an overview of security intelligence and what it aims to provide organizations. It then discusses requirements for security intelligence like risk-based analytics, context and intelligence, and connecting data and people. The presentation includes two demos of Splunk capabilities for security use cases. It promotes attending future tech talks and Splunk conferences to learn more.