Featured image
Truesec pattern
Tech Talk

Everything About Security Operations Centers (SOC)

Ransomware, malware, phishing, credential-stealing websites. How on earth are you supposed to keep your users and their endpoints safe? In this session we'll explain how you can detect the attackers at an early stage.

Keeping your users and their endpoints safe is a 24-hour job when attackers try to circumvent protection capabilities in every possible way. However, active and continuous 24/7/365 monitoring of your endpoints will optimize your chances to detect an attacker at an early stage. Don’t miss this Tech Talk with Truesec experts David Lilja and Mikael Almstedt who will share all you need to know about the SOC.

In this session, we'll talk about how you should respond and mitigate the attack. We’ll also answer the question everyone is talking about: What’s the difference between an EDR-based Security Operations Center (SOC) and a SIEM-based SOC?

Key Learnings

  • What are EDR and XDR, and how do they work.
  • What is a SIEM, and what is its purpose.
  • Threat hunting and advanced detection.
  • SOC from an incident response point of view.



Who It's For

Decision-makers, Security managers, IT managers, IT technicians, IT professionals, and those who work in an IT department and are interested in security issues.

Get Notified About Upcoming Tech Talks

Stay ahead in cyber

Join 1000+ other cyber professionals that get monthly updates from us with the key things to know.