Workshop 3: Discover the Secrets of the SOC & How to Build a Threat Hunting Team

  • Date 05 Jun 2019

Workshop 3: Discover the Secrets of the SOC & How to Build a Threat Hunting Team

05 Jun 2019, 14:00 - 16:00

Security Workshop
Language:
English

In the first half of this interactive workshop, we’ll talk about what goes into making a SOC work effectively. As well as providing the core monitoring and incident response function, SOCs can also provide many other services, such ensuring that security basics are in place using vulnerability management and security awareness, through to proactive, advanced threat hunting. Plus, to ensure effective spread of resource and scalability, SOCs should have continual focus on automation.

Secondly, if you’re not actively looking for the bad guys hiding in your network, you will never find them. However, building a successful threat hunting team requires more than tools and data. In this session, discover the secrets behind the award winning Cisco Talos team and how you can improve threat detection.

Learning Outcomes:

  1. The challenges that SOCs face and approaches to overcome them
  2. The array of services that SOCs provide
  3. The roadmap to build a SOC
  4. Learn how to threat hunt proactively to root out hidden threats
  5. Discover best practice on threat hunting from the largest non government threat intelligence team

 

Contributors

  • Martin Lee

    Speaker

    Head of Cisco Talos Outreach, EMEA

    Cisco

    As Technical Lead within Cisco’s Talos Security Intelligence and Research Group, Martin Lee researches the latest developments in cybersecurity and...

  • Simon Crocker

    Speaker

    Cisco SOC Advisory Services Lead EMEAR

    Cisco

    Simon is passionate about the value that security can provide to an organisation. He regularly provides consultancy at all levels to organisations,...

Business Issues covered

  1. What will this session help you to do?
    • Mitigate the effects of new vulnerabilities and exploits‎
    • Understand internal and external threats and keep a business secure‎

ReedExpo.Nova.Framework.Categorization.CategorySelection

Sponsors

Cisco

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.