Security Operations Centers are facing a key-role in detecting and fighting cyberattacks. Due to the interaction between complex technology, processes and people, a targeted approach in setting-up and operating a SOC is key to gain detection and reaction capabilities.
This
training is the fourth part and is designed for experienced experts in the field of IT and Information Security. Each participant will be asked to contribute a talk of choice. Content of the talks will be discussed with the trainers in advance. The session will be moderated by a trainer only. Training content will be provided by the participants only.
Potential topics of the expert exchange training could be:
- Experiences in operating SOCs
- Lessons learned from recent attacks
- New technologies, standards, or processes in the field of Information Security
- New developments in general best practices
- - Open Q&A session: discussing recent security events with experts