Security Operation Centers
David lilja | Mikael Almstedt
A Tech Talk all about SOC
See webcastBy submitting your email adress you will be able to see the webcast as many times as you want.
Ransomware, malware, phishing, credential stealing web sites. How on Earth are you supposed to keep your users and their endpoints safe? Attackers will try to circumvent protection capabilities in every possible way.
However, active and continuous 24/7/365 monitoring of your endpoints will give you a good chance to detect the attacker at an early stage. We’ll talk about how you should respond and mitigate the attack as well. And we’ll answer the question everyone is talking about; What’s the difference between an EDR based SOC (Security Operation Center) and a SIEM based SOC?
Don’t miss this week’s Tech Talk with Truesec experts David Lilja and Mikael Almstedt.
- What EDR and XDR is and how they work
- What a SIEM is and what is its purpose
- Threat Hunting and Advanced Detections
- SOC from an incident response point of view
Have a question you want to be answered during our Tech Talk? Mail it to us at firstname.lastname@example.org