Featured image
Truesec pattern
Tech Talk

Everything About Security Operations Centers (SOC)

Ransomware, malware, phishing, credential-stealing websites. How on earth are you supposed to keep your users and their endpoints safe? In this session we'll explain how you can detect the attackers at an early stage.
Share

Keeping your users and their endpoints safe is a 24-hour job when attackers will try to circumvent protection capabilities in every possible way. However, active and continuous 24/7/365 monitoring of your endpoints will optimize your chances to detect an attacker at an early stage. Don’t miss this Tech Talk with Truesec experts David Lilja and Mikael Almstedt who will share all you need to know about the SOC.

In this session, we'll talk about how you should respond and mitigate the attack as well. We’ll also answer the question everyone is talking about: What’s the difference between an EDR-based SOC (Security Operation Center) and a SIEM-based SOC?

Key Learnings:

  • What EDR and XDR are and how they work.
  • What is a SIEM is and what is its purpose.
  • Threat Hunting and Advanced Detections.
  • SOC from an incident response point of view.

Language:

English

Target Groups:

Decision-makers, Security managers, IT managers, IT technicians, IT professionals, and those of you who work in an IT department and who are interested in security issues.

Get Notified About Upcoming Tech Talks

Stay ahead in cyber

Join 1000+ other cyber professionals that get monthly updates from us with the key things to know.