{"id":19212,"date":"2023-10-10T13:48:18","date_gmt":"2023-10-10T11:48:18","guid":{"rendered":"https:\/\/sits.com\/events\/evolution-des-soc-von-ueberwachung-zu-intelligenter-bedrohungsanalyse\/"},"modified":"2025-01-24T09:30:44","modified_gmt":"2025-01-24T08:30:44","slug":"evolution-des-soc-von-ueberwachung-zu-intelligenter-bedrohungsanalyse","status":"publish","type":"events","link":"https:\/\/sits.friendventure.dev\/ch\/events\/evolution-des-soc-von-ueberwachung-zu-intelligenter-bedrohungsanalyse\/","title":{"rendered":"Evolution des SOC: Von \u00dcberwachung zu intelligenter Bedrohungsanalyse"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text]<span class=\"expandable-text\">Cyber Security als ganzheitlicher Ansatz: <a href=\"https:\/\/sits.com\/ch\/cyber-defense\/security-operations-center\/\">Security Operation Center (SOC)<\/a> haben sich im Laufe der Jahre von der reinen \u00dcberwachung und Alarmierung zu Cyber Defence Center weiterentwickelt und bieten auf diese Weise mehr als eine reine Sicherheits\u00fcberwachung. <\/span>[\/vc_column_text][vc_column_text]<span class=\"expandable-text\">Aktives reagieren und umfangreiche Hilfeleistungen \u2013 nicht nur im Notfall \u2013 sind ein wichtiger Baustein in der heutigen Sicherheitslage.<\/span>[\/vc_column_text][vc_column_text]<span class=\"expandable-text\">Wir zeigen auf, wie \u00dcberwachung, Alarmierung, Schutz und Hilfeleistungen f\u00fcr den Wiederanlauf optimal zusammenspielen k\u00f6nnen.<\/span>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text]Cyber Security als ganzheitlicher Ansatz: Security Operation Center (SOC) haben sich im Laufe der Jahre von der reinen \u00dcberwachung und Alarmierung zu Cyber Defence Center weiterentwickelt und bieten auf diese Weise mehr als eine reine Sicherheits\u00fcberwachung. [\/vc_column_text][vc_column_text]Aktives reagieren und umfangreiche Hilfeleistungen \u2013 nicht nur im Notfall \u2013 sind ein wichtiger Baustein in der heutigen Sicherheitslage.[\/vc_column_text][vc_column_text]Wir [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":5672,"template":"","meta":{"inline_featured_image":false,"footnotes":""},"video_categories":[325],"class_list":["post-19212","events","type-events","status-publish","has-post-thumbnail","hentry","video_categories-cyber-defense-ch"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Evolution des SOC: Von \u00dcberwachung zu intelligenter Bedrohungsanalyse - SITS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Evolution des SOC: Von \u00dcberwachung zu intelligenter Bedrohungsanalyse - SITS\" \/>\n<meta property=\"og:description\" content=\"[vc_row][vc_column][vc_column_text]Cyber Security als ganzheitlicher Ansatz: Security Operation Center (SOC) haben sich im Laufe der Jahre von der reinen \u00dcberwachung und Alarmierung zu Cyber Defence Center weiterentwickelt und bieten auf diese Weise mehr als eine reine Sicherheits\u00fcberwachung. [\/vc_column_text][vc_column_text]Aktives reagieren und umfangreiche Hilfeleistungen \u2013 nicht nur im Notfall \u2013 sind ein wichtiger Baustein in der heutigen Sicherheitslage.[\/vc_column_text][vc_column_text]Wir [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sits.friendventure.dev\/ch\/events\/evolution-des-soc-von-ueberwachung-zu-intelligenter-bedrohungsanalyse\/\" \/>\n<meta property=\"og:site_name\" content=\"SITS\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-24T08:30:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2023\/10\/CyberDefense6.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"805\" \/>\n\t<meta property=\"og:image:height\" content=\"1435\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/events\/evolution-des-soc-von-ueberwachung-zu-intelligenter-bedrohungsanalyse\/\",\"url\":\"https:\/\/sits.friendventure.dev\/ch\/events\/evolution-des-soc-von-ueberwachung-zu-intelligenter-bedrohungsanalyse\/\",\"name\":\"Evolution des SOC: Von \u00dcberwachung zu intelligenter Bedrohungsanalyse - SITS\",\"isPartOf\":{\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/events\/evolution-des-soc-von-ueberwachung-zu-intelligenter-bedrohungsanalyse\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/events\/evolution-des-soc-von-ueberwachung-zu-intelligenter-bedrohungsanalyse\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2023\/10\/CyberDefense6.jpg\",\"datePublished\":\"2023-10-10T11:48:18+00:00\",\"dateModified\":\"2025-01-24T08:30:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/events\/evolution-des-soc-von-ueberwachung-zu-intelligenter-bedrohungsanalyse\/#breadcrumb\"},\"inLanguage\":\"de-CH\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sits.friendventure.dev\/ch\/events\/evolution-des-soc-von-ueberwachung-zu-intelligenter-bedrohungsanalyse\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-CH\",\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/events\/evolution-des-soc-von-ueberwachung-zu-intelligenter-bedrohungsanalyse\/#primaryimage\",\"url\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2023\/10\/CyberDefense6.jpg\",\"contentUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2023\/10\/CyberDefense6.jpg\",\"width\":805,\"height\":1435},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/events\/evolution-des-soc-von-ueberwachung-zu-intelligenter-bedrohungsanalyse\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/sits.friendventure.dev\/ch\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Evolution des SOC: Von \u00dcberwachung zu intelligenter Bedrohungsanalyse\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/#website\",\"url\":\"https:\/\/sits.friendventure.dev\/ch\/\",\"name\":\"SITS\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sits.friendventure.dev\/ch\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-CH\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/#organization\",\"name\":\"SITS\",\"url\":\"https:\/\/sits.friendventure.dev\/ch\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-CH\",\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"contentUrl\":\"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg\",\"width\":557,\"height\":322,\"caption\":\"SITS\"},\"image\":{\"@id\":\"https:\/\/sits.friendventure.dev\/ch\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Evolution des SOC: Von \u00dcberwachung zu intelligenter Bedrohungsanalyse - SITS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"de_DE","og_type":"article","og_title":"Evolution des SOC: Von \u00dcberwachung zu intelligenter Bedrohungsanalyse - SITS","og_description":"[vc_row][vc_column][vc_column_text]Cyber Security als ganzheitlicher Ansatz: Security Operation Center (SOC) haben sich im Laufe der Jahre von der reinen \u00dcberwachung und Alarmierung zu Cyber Defence Center weiterentwickelt und bieten auf diese Weise mehr als eine reine Sicherheits\u00fcberwachung. [\/vc_column_text][vc_column_text]Aktives reagieren und umfangreiche Hilfeleistungen \u2013 nicht nur im Notfall \u2013 sind ein wichtiger Baustein in der heutigen Sicherheitslage.[\/vc_column_text][vc_column_text]Wir [&hellip;]","og_url":"https:\/\/sits.friendventure.dev\/ch\/events\/evolution-des-soc-von-ueberwachung-zu-intelligenter-bedrohungsanalyse\/","og_site_name":"SITS","article_modified_time":"2025-01-24T08:30:44+00:00","og_image":[{"width":805,"height":1435,"url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2023\/10\/CyberDefense6.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"1 Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sits.friendventure.dev\/ch\/events\/evolution-des-soc-von-ueberwachung-zu-intelligenter-bedrohungsanalyse\/","url":"https:\/\/sits.friendventure.dev\/ch\/events\/evolution-des-soc-von-ueberwachung-zu-intelligenter-bedrohungsanalyse\/","name":"Evolution des SOC: Von \u00dcberwachung zu intelligenter Bedrohungsanalyse - SITS","isPartOf":{"@id":"https:\/\/sits.friendventure.dev\/ch\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sits.friendventure.dev\/ch\/events\/evolution-des-soc-von-ueberwachung-zu-intelligenter-bedrohungsanalyse\/#primaryimage"},"image":{"@id":"https:\/\/sits.friendventure.dev\/ch\/events\/evolution-des-soc-von-ueberwachung-zu-intelligenter-bedrohungsanalyse\/#primaryimage"},"thumbnailUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2023\/10\/CyberDefense6.jpg","datePublished":"2023-10-10T11:48:18+00:00","dateModified":"2025-01-24T08:30:44+00:00","breadcrumb":{"@id":"https:\/\/sits.friendventure.dev\/ch\/events\/evolution-des-soc-von-ueberwachung-zu-intelligenter-bedrohungsanalyse\/#breadcrumb"},"inLanguage":"de-CH","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sits.friendventure.dev\/ch\/events\/evolution-des-soc-von-ueberwachung-zu-intelligenter-bedrohungsanalyse\/"]}]},{"@type":"ImageObject","inLanguage":"de-CH","@id":"https:\/\/sits.friendventure.dev\/ch\/events\/evolution-des-soc-von-ueberwachung-zu-intelligenter-bedrohungsanalyse\/#primaryimage","url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2023\/10\/CyberDefense6.jpg","contentUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2023\/10\/CyberDefense6.jpg","width":805,"height":1435},{"@type":"BreadcrumbList","@id":"https:\/\/sits.friendventure.dev\/ch\/events\/evolution-des-soc-von-ueberwachung-zu-intelligenter-bedrohungsanalyse\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/sits.friendventure.dev\/ch\/"},{"@type":"ListItem","position":2,"name":"Evolution des SOC: Von \u00dcberwachung zu intelligenter Bedrohungsanalyse"}]},{"@type":"WebSite","@id":"https:\/\/sits.friendventure.dev\/ch\/#website","url":"https:\/\/sits.friendventure.dev\/ch\/","name":"SITS","description":"","publisher":{"@id":"https:\/\/sits.friendventure.dev\/ch\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sits.friendventure.dev\/ch\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-CH"},{"@type":"Organization","@id":"https:\/\/sits.friendventure.dev\/ch\/#organization","name":"SITS","url":"https:\/\/sits.friendventure.dev\/ch\/","logo":{"@type":"ImageObject","inLanguage":"de-CH","@id":"https:\/\/sits.friendventure.dev\/ch\/#\/schema\/logo\/image\/","url":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","contentUrl":"https:\/\/sits.friendventure.dev\/wp-content\/uploads\/2024\/04\/sits-logo-new.svg","width":557,"height":322,"caption":"SITS"},"image":{"@id":"https:\/\/sits.friendventure.dev\/ch\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/sits.friendventure.dev\/ch\/wp-json\/wp\/v2\/events\/19212","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sits.friendventure.dev\/ch\/wp-json\/wp\/v2\/events"}],"about":[{"href":"https:\/\/sits.friendventure.dev\/ch\/wp-json\/wp\/v2\/types\/events"}],"author":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/ch\/wp-json\/wp\/v2\/users\/4"}],"version-history":[{"count":3,"href":"https:\/\/sits.friendventure.dev\/ch\/wp-json\/wp\/v2\/events\/19212\/revisions"}],"predecessor-version":[{"id":19567,"href":"https:\/\/sits.friendventure.dev\/ch\/wp-json\/wp\/v2\/events\/19212\/revisions\/19567"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sits.friendventure.dev\/ch\/wp-json\/wp\/v2\/media\/5672"}],"wp:attachment":[{"href":"https:\/\/sits.friendventure.dev\/ch\/wp-json\/wp\/v2\/media?parent=19212"}],"wp:term":[{"taxonomy":"video_categories","embeddable":true,"href":"https:\/\/sits.friendventure.dev\/ch\/wp-json\/wp\/v2\/video_categories?post=19212"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}