Defeating Advanced Adversaries with Tactical Analytics

In this webinar, you will see how tactical analytics (the main pillar of SOC 3.0) can be set up and used to greatly enhance an organization's security posture against advanced adversaries.

It is a known fact that the traditional reactive defense model is both ineffective and obsolete. The sophisticated techniques, tactics and procedures of modern adversaries necessitate that organizations adopt a proactive defense model and transition to SOC 3.0 operations to be better protected. In this webinar, you will be provided with a clear and technical plan on how to transition to SOC 3.0 and, most importantly, on how to establish a tactical analytics capability to effectively detect and defeat advanced adversaries.

On Demand
1h 00min

Join us for this informative, interactive webinar where you’ll:

  • Learn about the main pillars of SOC 3.0 operations (Tactical Analytics, Adversary Simulation & Practical IT Sec Stuff Training)
  • Understand how you can defend against the next-generation cyber-attacks by utilizing tactical analytics
  • Witness how you can detect APT-level attacks
  • Review what kind of data you should consume, why you need to enrich them, how to analyze and correlate them, as well as how to utilize prebaked SIEM queries as tripwires to swiftly detect sophisticated attacks

Tactical analytics is certainly not a new buzz word, but the way forward. That’s why a technical demonstration will also be provided regarding how tactical analytics could have been used to detect an APT-level operation against a corporate network.

Featured Speakers

  • Dimitrios Bougioukas
    Dimitrios Bougioukas
    Training Director

    Dimitrios holds a B.Sc. in Computer Science from the Athens University of Economics and Business.
    Before joining eLearnSecurity, he worked as a Business Information Security Engineer and Information Security Analyst for a major financial institution, and as a Penetration Tester within EY's practice.
    Dimitrios specializes in advanced cyber threat simulation, threat intelligence and purple team tactics. He has been engaged on numerous penetration testing activities against critical infrastructure, web applications and mobile applications.
    Dimitrios has presented at information security conferences such as BSides and has received acknowledgements from major companies such as IBM Trusteer and LG for finding and reporting vulnerabilities in their web applications.
    In the context of his professional career, Dimitrios has received prestigious information security awards in highly competitive contests such as the Retail Banker International Awards.

  • Eric Bruno
    Eric Bruno
    Contributing Editor
    Dark Reading

    Eric Bruno is a contributing editor to Dark Reading with more than 20 years of experience in the information technology community. He is a highly requested moderator and speaker for a variety of conferences and other events on topics spanning the technology spectrum from the desktop to the data center.

Sponsored By