Everything about Security Operations Centers (SOC)

Keeping your users and their endpoints safe is a 24-hour job when attackers try to circumvent protection capabilities in every possible way. However, active and continuous 24/7/365 monitoring of your endpoints will optimize your chances to detect an attacker at an early stage. Don’t miss this Tech Talk with Truesec experts David Lilja and Mikael Almstedt who will share all you need to know about the SOC.

In this session, we'll talk about how you should respond and mitigate the attack. We’ll also answer the question everyone is talking about: What’s the difference between an EDR-based Security Operations Center (SOC) and a SIEM-based SOC?

Key learnings

  • What are EDR and XDR, and how do they work?
  • What is a SIEM, and what is its purpose?
  • Threat hunting and advanced detection.
  • SOC from an incident response point of view.


Who is it for
Decision-makers, Security managers, IT managers, IT technicians, IT professionals, and those who work in an IT department and are interested in security issues.