Description
We've seen recreations and online exploits presented from the attacker's point of view, but what do these attacks look like on the defender's side? In this informative session, a top security operations center (SOC) expert will show, step-by-step, how an attack appeared in an organization and the steps to correlate information about the attack and develop an effective mitigation strategy.
Get a look into the detection process from the defender's perspective, including behind-the-scenes of a SOC, real-time correlation against indicators of compromise (IOC), analysis, hunt, remediation and more. Hear war stories about specific incidents and attacks, along with how they were identified and remediated. You'll also gain insight on how a SOC can identify a sophisticated attack sooner in its evolution, helping minimize the damage it might cause.
Presenter
Brad Green performs technical pre-sales activities at Arctic Wolf Networks. He has spent the last 18 years learning and gaining experience in IT operations, information security, and cybersecurity. Over the past few years, Brad has focused on helping companies add to their detection and response capabilities, actively maturing their security programs.
Lunch Sponsor
Arctic Wolf Networks and Cambridge Computer
#Houston
#Security
#LegalSEC
#ServerOperationsandSecurity