26/11/24
10:45
-
11:25
Spoofing commands - Can you trust process creation logs?
26/11/24
11:35
-
12:15
Hiding in plain sight: How sub domain attacks use your email authentication against you
26/11/24
13:35
-
14:15
How NOT to run a security operation centre, a SOC manager’s perspective
26/11/24
13:35
-
14:15
Owning your cyber security mid-game strategy
26/11/24
14:25
-
15:05
Taming Threats: A symphony of two worlds – Paper trail meets threat trail
26/11/24
14:25
-
15:05
Measures and metrics: How to report on more than just the SOC
26/11/24
15:50
-
16:30
Ransomware attack scenario review
26/11/24
15:50
-
16:30
SOC metrics and performance measurement
27/11/24
15:50
-
16:30
Mature your detection capabilities - Evolve your SIEM and know your priorities
28/11/24
13:50
-
14:30
Effective security detections: From intent to action
28/11/24
14:40
-
15:20
SOC200 and Threat Hunting with Kali Purple