Thank you for being part of the Securing the Future – Managed Services from Endpoint to 24/7 SOC Event with Bosch CyberCompare on 21.11.2023. On this page you will find a recording of our panel discussion, in which many different questions were discussed with the experts, as well as information about the individual speakers.
The event with Bosch CyberCompare
Experts Who Participated in Our Event
Rewatch Parts of Our Event
Get Access to the Presentations
benefit from the know-how of our experts
Our Speakers + Their Sessions
SOC 2.0 - How our Controlware SOC really protects you from cyber threats using XDR
The presentation will show why modern EDR/XDR platforms are superior to classical approaches to cyber threat detection and how the Controlware Managed SOC Service successfully protects you from cyber threats on this basis.
The presentation will show why modern EDR/XDR platforms are superior to classical approaches to cyber threat detection and how the Controlware Managed SOC Service successfully protects you from cyber threats on this basis.
Corelight Open NDR Platform: Complete visibility in your network
Trust, or take responsibility? The SOC-Dilemma
A SOC doesn't have to be cumbersome. With Google Chronicle SIEM and SOAR, we bring the SOC to enterprises with Google speed. Short onboardings, fast results, multi-layer defense offerings and AI support are strategic cornerstones.
A SOC doesn't have to be cumbersome. With Google Chronicle SIEM and SOAR, we bring the SOC to enterprises with Google speed. Short onboardings, fast results, multi-layer defense offerings and AI support are strategic cornerstones.
Managed Services: How Integrated Threat Intelligence and Proactive Threat Hunting Stops Labyrinth Chollima or Scattered Spider.
SOC as a Service: The Key to comprehensive Cyber Security
Learn not only how simple SOC services can be, but also the savings potential offered by managed security services. Furthermore, we show how a team of security consultants can support your internal processes and help them improve the company's defense strategy in the long term.
Learn not only how simple SOC services can be, but also the savings potential offered by managed security services. Furthermore, we show how a team of security consultants can support your internal processes and help them improve the company's defense strategy in the long term.
Insights into real hacking attacks on companies in the DACH region
Targeted cyber attacks on companies in Germany are on the rise. InfoGuard gives you interesting insights into real cyber attacks on companies in the DACH region in recent months and tells you how the InfoGuard Cyber Defence Center and CSIRT (Computer Security Incident Response Team) helped the affected companies out of the crisis.
Targeted cyber attacks on companies in Germany are on the rise. InfoGuard gives you interesting insights into real cyber attacks on companies in the DACH region in recent months and tells you how the InfoGuard Cyber Defence Center and CSIRT (Computer Security Incident Response Team) helped the affected companies out of the crisis.
SOC as a Service in action: A look through the keyhole
Even for large enterprises, it is extremely difficult to operate a Security Operations Center (SOC) in-house around the clock. Outsourcing this task is the norm today. We at Orange Cyberdefense, specialize in this very area. This presentation will provide a behind-the-scenes look at our expertise and how we ensure 24/7 SOC operations for a variety of customers.
Even for large enterprises, it is extremely difficult to operate a Security Operations Center (SOC) in-house around the clock. Outsourcing this task is the norm today. We at Orange Cyberdefense, specialize in this very area. This presentation will provide a behind-the-scenes look at our expertise and how we ensure 24/7 SOC operations for a variety of customers.
How collecting and analyzing log data helps protect identities and data
Various regulations require the centralization of log data in order to detect unusual activities in good time and thus to protect one's own identities from being taken over by an attacker and to prevent data loss. In addition to attack detection, an information capability must also be established in order to control proactive measures to improve cybersecurity in a targeted manner, but also to be able to trace a possible course of attack in the event of compromise.
Various regulations require the centralization of log data in order to detect unusual activities in good time and thus to protect one's own identities from being taken over by an attacker and to prevent data loss. In addition to attack detection, an information capability must also be established in order to control proactive measures to improve cybersecurity in a targeted manner, but also to be able to trace a possible course of attack in the event of compromise.
XDR under the magnifier: Which solution suits you? Find your perfect match.
Today's market offers companies a wide range of solutions in the field of IT security. It is not far-fetched to see the wood for the trees. We want to clarify together where the difference lies within the XDR solutions and whether XDR is ultimately the right solution.
Today's market offers companies a wide range of solutions in the field of IT security. It is not far-fetched to see the wood for the trees. We want to clarify together where the difference lies within the XDR solutions and whether XDR is ultimately the right solution.
Real-time monitoring: the crucial role of a SIEM in detecting cyber attacks
In a world of increasing cyber threats, real-time SIEM monitoring is essential. Learn how SIEM systems analyse the course of an attack, make intelligent decisions and raise alarms in time to protect networks with a real-life case study.
In a world of increasing cyber threats, real-time SIEM monitoring is essential. Learn how SIEM systems analyse the course of an attack, make intelligent decisions and raise alarms in time to protect networks with a real-life case study.
Revolutionise your SOC by rethinking SIEM
Digital transformation is creating new challenges for many Security Operations Centres (SOC) today, and today SOC teams are inundated with alerts and incidents. On average, almost a third of the alarms are not processed in the SOC every day today due to a lack of time and skilled staff. So the question is, how can we provide real-time security in the future? Cortex XSIAM is a modern and innovative SOC platform that relies on open data architecture while prioritising automation to support analysts in their daily work through AI.
Digital transformation is creating new challenges for many Security Operations Centres (SOC) today, and today SOC teams are inundated with alerts and incidents. On average, almost a third of the alarms are not processed in the SOC every day today due to a lack of time and skilled staff. So the question is, how can we provide real-time security in the future? Cortex XSIAM is a modern and innovative SOC platform that relies on open data architecture while prioritising automation to support analysts in their daily work through AI.
Make Informed Cyber Resilience Decisions - Thanks to MDR
Managed SOC: challenges and opportunities
WithSecure™ Elements Detection and Response of Cybercop
"How can artificial intelligence make life easier for humans?" Currently one of the most hotly debated questions and not only in the IT world. One application area of AI and machine learning that has been established for us for years is in anomaly detection. In the talk, we address the question of how the machine can help humans make the right decisions in IT security incidents.
"How can artificial intelligence make life easier for humans?" Currently one of the most hotly debated questions and not only in the IT world. One application area of AI and machine learning that has been established for us for years is in anomaly detection. In the talk, we address the question of how the machine can help humans make the right decisions in IT security incidents.
Phishing was yesterday, RDP the new (R)ansomware (D)elivery (P)rotocol
Modern and successful ransomware attacks no longer start at the endpoint. Those who rely on the endpoint today are often abandoned. Palo Alto Networks XDR Strategy: "Shift Left in Detection and Response" to detect attacks earlier and more effectively.
Modern and successful ransomware attacks no longer start at the endpoint. Those who rely on the endpoint today are often abandoned. Palo Alto Networks XDR Strategy: "Shift Left in Detection and Response" to detect attacks earlier and more effectively.
Fighting cyber threats: The indispensable use of SOAR in the SOC
In addition to automation and data enrichment, SOAR enables real-time response to threats through its advanced response capabilities. Learn how the integration of diverse security tools in SOAR increases the effectiveness of a SOC, minimises response times and provides a comprehensive security strategy.
In addition to automation and data enrichment, SOAR enables real-time response to threats through its advanced response capabilities. Learn how the integration of diverse security tools in SOAR increases the effectiveness of a SOC, minimises response times and provides a comprehensive security strategy.
A SOC is a SOC? Really?
Making risk-based decisions based on real-time information is the subtle difference. Even though we all always like to get under the hood and see how the machine works, when it comes to a SOC and MDR as a service, it's important to know that the combination of technology, expertise and processes will result in rapid detection of a critical incident. We use a critical incident to show the specific process, from detection to alerting.
Making risk-based decisions based on real-time information is the subtle difference. Even though we all always like to get under the hood and see how the machine works, when it comes to a SOC and MDR as a service, it's important to know that the combination of technology, expertise and processes will result in rapid detection of a critical incident. We use a critical incident to show the specific process, from detection to alerting.
Future-proof IT security - what role do humans and AI play?
Cyber attacks with ransomware, data theft and business interruption are the No. 1 existential threat for companies today. To be able to detect and stop hackers at an early stage, companies need several prerequisites. In addition to advanced tools including AI support to protect and detect cyberattacks, experts are needed to operate these tools 24/7 and know how to proceed in the event of an attack.
Cyber attacks with ransomware, data theft and business interruption are the No. 1 existential threat for companies today. To be able to detect and stop hackers at an early stage, companies need several prerequisites. In addition to advanced tools including AI support to protect and detect cyberattacks, experts are needed to operate these tools 24/7 and know how to proceed in the event of an attack.
Is it all XDR & SIEM now? How Orange Cyberdefense with EDR can strengthen your IT security.
The IT security landscape is changing rapidly and people are just as quick to think in terms of ultimate solutions... Does it really always have to be SIEM? Is XDR absolutely necessary? Orange Cyberdefense shows that there is another way.
The IT security landscape is changing rapidly and people are just as quick to think in terms of ultimate solutions... Does it really always have to be SIEM? Is XDR absolutely necessary? Orange Cyberdefense shows that there is another way.
XDR or SIEM? XDR and SIEM together as the basis for SOC/MDR services!
Threats, requirements and examples of a legally compliant implementation of the prescribed monitoring solution
Make Microsoft Defender Work Smarter and Harder with AI-Powered MXDR
SIEM - Modernisation of a SOC
Previous
Next