Get a look into the detection process from the defender's perspective, including behind-the-scenes of a SOC, real-time correlation against indicators of compromise (IOC), analysis, hunt, remediation and more. Hear war stories about specific incidents and attacks, along with how they were identified and remediated. You'll also gain insight on how a SOC can identify a sophisticated attack sooner in its evolution, helping minimize the damage it might cause.
*Space is limited to 20 participants.
Bryan Van Den Heuvel - Presales Systems Engineer, Arctic Wolf Networks
Arctic Wolf Networks
Follow Us
© International Legal Technology Association. All Rights Reserved.
Accessibility | Terms & Conditions | Support Center