In today's internet environment, regardless of whether it's on-premises or cloud-based, enterprises are constantly facing cybersecurity threats. Once attacked and damaged, it's common during the process of tracing back to encounter attempts by attackers to destroy evidence (Covered Track), making it difficult to trace the source, thus leading to repeated hacking incidents. Especially when enterprises have hybrid cloud environments, tracing the attack process becomes relatively complex. Therefore, constructing a SIEM system that can simultaneously accommodate security logs and monitor various hybrid architectures can assist enterprises in preserving important logs and monitoring threats. This course will provide hands-on operation to help students understand the principles of SIEM and its related diverse functionalities.
Understanding how enterprises utilize Sumo Logic SIEM for detecting, monitoring, and instantaneously alerting against threats from hackers and APT teams is crucial. Enterprises can construct customized detection rules according to their uniqueness, assisting blue teams in more effectively detecting, analyzing, alerting, and responding to threats. This, in turn, enhances the overall security defense capability of the enterprise.
Through the training environment provided by Sumo Logic, participants will have the opportunity to experience the diverse and rich functionalities of Cloud SIEM firsthand. During the course, participants will be guided to manually write customized threat detection rules, fine-tune rules, and explore how SIEM utilizes AI/ML for threat correlation analysis.
Blue team member, such as: information security analysts, system administrators, network engineers, etc.
TOPIC / TRACK
CyberLAB
LOCATION
Taipei Nangang Exhibition Center, Hall 2
4F 4D
LANGUAGE
Chinese
CYBERSEC 2024 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy 。