Specialties: Mobile Network Security – 3GPP (GTP) and LTE (SecGW) TS33.201/301 security architectures and service flow analysis.
Managed Security Service Provider (MSSP) solution architecture design and deployment – SSL VPN and UTM offerings.
Cloud Computing Security Control Design – Multi-tenancy, Virtualization, Elasticity, Encryption Key Management.
SCADA/ICS Security – Secure Architecture and SCADA Security Operations Center
Building a Cyber Security Operations Center
Modern day cyber threats are ever increasing and organizations face a challenge to proactively and continuously monitor security posture across their entire infrastructure whilst keep attackers and threat actors at bay. In this presentation we will cover the fundamental building blocks of building a security operations center that is proactive and act as the line of authority for all your other security entities like incident management, forensics, vulnerability management etc. A reference case study will be presented along with proven implementation methodology.
1. SIEM 2.0 – log collection, aggregation, analytics and correlation
2. Contextual Threat Cases and Situational Awareness
3. SOC 2.0 and its components to form an eco-system.
4. Building Threat Intelligence and Early warning detection system within your command center.
5. Some new concepts – OSINT and SOCMINT and how it helps.
6. SOC Processes, Procedures and Workflows.
Are you the next cyber security superstar?
Ready for this year's presentations?
By registering you will unlock access to 60+ speakers and two full days with cyber security news & showcases from worldwide leaders.
Sponsors & Partners
They help us make this conference possible.
Orange „brings you closer to what matters to you”.
This is our brand promise: to bring our clients closer to what’s essential to them and to keep them always connected and in touch with the latest technologies, by offering them the best and safest communication experience.