
SOC Alarm: What now? (Real UseCase)
From mobile phone to domain admin in 3...2...1...Implementing an effective SOC to disrupt the cyber kill chain in a timely manner.
Topic
Cloud SecuritySIEM / Threat Analytics / SOC
When & Where
Tue, 10/10/2023, 14:15 - 14:30
Details
Format:
Management lecture
Session description
Cyber attacks have become a reality for everyone. Attackers can gain access to the Active Directory (AD) in a very short time and usually only remain on the corporate network for an equally short time. Especially in the case of cloud attacks, access is gained in just a few minutes. This makes it all the more important to have a functioning and coordinated cyber security solution, especially in the area of threat detection and incident response, as well as across all stakeholders involved.
In this presentation, we will take you through the course of a real cyber attack, from infection vector and lateral movement to privilege escalation. How was the incident successfully detected thanks to our implemented SIEM system? Which specific use cases were implemented? What were the incident r ...
In this presentation, we will take you through the course of a real cyber attack, from infection vector and lateral movement to privilege escalation. How was the incident successfully detected thanks to our implemented SIEM system? Which specific use cases were implemented? What were the incident r ...