Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Header of IBM Deutschland GmbH
Forums it-sa Expo Knowledge Forum E

SOC Alarm: What now? (Real UseCase)

From mobile phone to domain admin in 3...2...1...Implementing an effective SOC to disrupt the cyber kill chain in a timely manner.

calendar_today Tue, 10.10.2023, 14:15 - 14:30

event_available On site

Action Video

south_east

Action description

south_east

Speaker

south_east

Themes

Cloud Security SIEM / Threat Analytics / SOC

Key Facts

  • Effective SOC
  • Threat Detection
  • Incident Response

Event

This action is part of the event Forums it-sa Expo

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

Cyber attacks have become a reality for everyone. Attackers can gain access to the Active Directory (AD) in a very short time and usually only remain on the corporate network for an equally short time. Especially in the case of cloud attacks, access is gained in just a few minutes. This makes it all the more important to have a functioning and coordinated cyber security solution, especially in the area of threat detection and incident response, as well as across all stakeholders involved.
In this presentation, we will take you through the course of a real cyber attack, from infection vector and lateral movement to privilege escalation. How was the incident successfully detected thanks to our implemented SIEM system? Which specific use cases were implemented? What were the incident response steps taken, including forensic analysis after the identification of the attack by our SOC team?
Look forward to an exciting insight into the world of cyber defence by our SOC analyst and his incident response colleague!
... read more

Language: German

Questions and Answers: No

Speaker

show more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.