Lær, hvordan du opdager tegn på utilstrækkelig teknologi og responskapaciteter og få strategier til at reducere den arbejdsbyrde, som dit MDR/SOC pålægger dit team, når Jan Bervar, Group Security Architect i Conscia, afholder webinar den 24. oktober i anledning af Cyber Security Month. (Webinaret afholdes på engelsk).
Whether you’re re-evaluating your current MDR/SOC provider or searching for a new one, this webinar will offer the insights you need to make informed decisions and strengthen your organization’s security capabilities.
Rethinking Managed Detection and Response
Relying on traditional approaches to managed detection and response (MDR) may leave critical gaps in visibility, response capabilities, and operational efficiency. Many SOCs, both old and new, are built on outdated technologies or vendor-driven solutions that don’t deliver the comprehensive security needed to protect your organization.
In this webinar, we’ll expose these overlooked issues and offer practical solutions to help you choose an MDR solution that genuinely enhances your security operations. You’ll leave with a deeper understanding of the questions you should ask and the pitfalls to avoid when selecting or evaluating your SOC/MDR provider.
Agenda – Overcoming Key Challenges in Security Operations
- Inadequate Threat Visibility: Many SOCs are grappling with technologies that fail to provide comprehensive threat visibility. This webinar will examine the limitations of current technologies and discuss strategies to achieve a more robust threat detection framework.
- Response-Focused Operations: Despite the critical need for swift incident response, many SOCs are not adequately response-focused. Often, the burden of containing an incident falls on the customer. We will highlight the importance of developing response-centric SOCs and offer guidance on how to shift focus toward rapid and effective incident containment.
- Dependency on Vendor Technology: Relying exclusively on vendor-supplied technology can be a pitfall for many SOCs. While vendor solutions are valuable, they are not infallible. We will explore the drawbacks of over-reliance on vendor technologies and propose a balanced approach for a more resilient SOC environment.
- Managing Workload: The operational demands on SOCs often translate into a significant workload for customers. This session will address the issue of workload management and suggest methods to streamline SOC operations, reducing the burden on customers and allowing for more efficient and effective threat management.
About the speaker
Jan Bervar, Group Security Architect, has spent 25 years in cybersecurity and is currently busy with securing the leading edge: advanced detection and response, cloud security, security automation, and security in the era of the Internet of Things (IoT).
Using a “yes” security approach whenever possible, Jan provides organizations with an optimal, controlled-risk approach that enables them to try out new ideas, all while deploying common sense and robust countermeasures.