Keeping your users and their endpoints safe is a 24-hour job when attackers will try to circumvent protection capabilities in every possible way. However, active and continuous 24/7/365 monitoring of your endpoints will give you a good chance to detect the attacker at an early stage. Don’t miss this Tech Talk with Truesec experts David Lilja and Mikael Almstedt who will share all you need to know about SOC.
In this session, we'll talk about how you should respond and mitigate the attack as well. We’ll also answer the question everyone is talking about; What’s the difference between an EDR based SOC (Security Operation Center) and a SIEM based SOC?
- What EDR and XDR is and how they work
- What a SIEM is and what is its purpose
- Threat Hunting and Advanced Detections
- SOC from an incident response point of view
Decision makers, Security managers, IT managers, IT technicians, IT professionals, and those of you who work in an IT department and who are interested in security issues.