Context-Based Detection Engineering: Who Is Attacking You, and How Can You Defend?

Поделиться
HTML-код
  • Опубликовано: 4 окт 2024
  • Dive into comprehensive insights on Detection Engineering and Threat Hunting, unlocking the latest innovations and trends in the domain. We’ll guide you through assessing your SIEM and EDR posture, addressing detection coverage gaps, and elevating your SOC maturity to maximize ROI.
    During this session, we discuss and share practical insights on:
    The evolution of cybersecurity and associated challenges
    Understanding Detection Engineering and Threat Hunting: What they are and why they matter
    Gaining a clear vision of your SIEM and EDR posture to close detection gaps and elevate SOC maturity
    Adopting tailored threat intelligence and customizable detection algorithms mapped to MITRE ATT&CK®
    An actionable roadmap for continuous Threat Hunting
    For any questions, please reach out to us via the QR-code Workshop form at the end of the webinar.
    Additional Resources:
    SOC Prime Threat Bounty Program - my.socprime.co...
    SIGMA Rules: The Beginner’s Guide - socprime.com/b....
    SOC Prime blog - socprime.com/b...
    Threat Detection Marketplace tdm.socprime.c... - the repository of curated and ready-to-deploy Sigma rules mapped to ATT&CK and enriched with relevant context on any cyber attack or threat, including zero-days, CTI, and Red Team tooling
    Uncoder AI tdm.socprime.c... - IDE for threat detection engineering to write Sigma rules faster and easier, validate rule syntax & detection code, and translate it to 44 SIEM, EDR, XDR, and Data Lake solutions on the fly
    Connect with Us:
    Discord: / discord
    Twitter: / soc_prime
    LinkedIn: / soc-prime

Комментарии •