Featured image
Truesec pattern
Tech Talk

Everything About Security Operations Centers (SOC)

Ransomware, malware, phishing, credential stealing websites. How on earth are you supposed to keep your users and their endpoints safe? In this session we'll explain how you can detect the attackers at an early stage.

Keeping your users and their endpoints safe is a 24-hour job when attackers will try to circumvent protection capabilities in every possible way. However, active and continuous 24/7/365 monitoring of your endpoints will give you a good chance to detect the attacker at an early stage. Don’t miss this Tech Talk with Truesec experts David Lilja and Mikael Almstedt who will share all you need to know about SOC.

In this session, we'll talk about how you should respond and mitigate the attack as well. We’ll also answer the question everyone is talking about; What’s the difference between an EDR based SOC (Security Operation Center) and a SIEM based SOC?

Key Learnings:

  • What EDR and XDR is and how they work
  • What a SIEM is and what is its purpose
  • Threat Hunting and Advanced Detections
  • SOC from an incident response point of view



Target groups:

Decision makers, Security managers, IT managers, IT technicians, IT professionals, and those of you who work in an IT department and who are interested in security issues.

Get Notified About Upcoming Tech Talks

Sign up to get updated on upcoming Tech Talks and live hacks with leading experts featuring STÖK.