LIVE webinar

Everything about
Security Operation Centers

David lilja | Mikael Almstedt

A Tech Talk all about SOC

See webcast

By submitting your email adress you will be able to see the webcast as many times as you want.
  • Hidden
  • Hidden

Ransomware, malware, phishing, credential stealing web sites. How on Earth are you supposed to keep your users and their endpoints safe? Attackers will try to circumvent protection capabilities in every possible way.

However, active and continuous 24/7/365 monitoring of your endpoints will give you a good chance to detect the attacker at an early stage. We’ll talk about how you should respond and mitigate the attack as well. And we’ll answer the question everyone is talking about; What’s the difference between an EDR based SOC (Security Operation Center) and a SIEM based SOC?

Don’t miss this week’s Tech Talk with Truesec experts David Lilja and Mikael Almstedt.

Key learnings:

  • What EDR and XDR is and how they work
  • What a SIEM is and what is its purpose
  • Threat Hunting and Advanced Detections
  • SOC from an incident response point of view


Have a question you want to be answered during our Tech Talk? Mail it to us at



Target groups:

Decision makers, Security managers, IT managers, IT technicians, IT professionals, and those of you who work in an IT department and who are interested in security issues.

Sign up:


Mikael Almstedt

Mikael is working as a Threat Hunter and SOC Level 3 analyst. Mikael supports Level 1 and Level 2 with escalated incidents, and is passionate about finding previously undetected malicious and suspicious activities

David lilja

David is working as Level 3 Analysts in the Truesec SOC. He is hunting for unknown threats and techniques and is also assisting the Level 1 and Level 2 Analysts in their daily fight against threat actors across the world.