UA

Building an Effective Cyber Security Operations Center: Maturity Evaluation and Continuous Improvement

Tags:

Building an Effective Cyber Security Operations Center: Maturity Evaluation and Continuous Improvement

Format: Online
Date: 3 / 3 / 26
Time: 18:00
Registration: until March 3, 15:00

about

We know about cyberattacks firsthand — government organizations, private businesses, and even state-owned registries have already been threatened. The issue of building systemic cybersecurity centers is becoming increasingly relevant. At the same time, the demand for cybersecurity specialists is growing. 

 

To help junior specialists gain a realistic understanding of how security processes are built, we have created this webinar, during which we will look at how SOC works in practice, how to build attack detection scenarios, respond to incidents, and use automation tools. As a result, you will be familiar with the necessary skills and market requirements, as well as the under-the-hood SOC workflow. 

 

The webinar is organized by SET University and the Centre for International Cooperation at Lviv National University as part of the international grant project “AI-Driven Cybersecurity: Opportunities and Challenges,” funded by the Swedish Institute within the SI Baltic Sea Neighbourhood Programme. The speaker is an expert from the global IT services provider SoftServe.

what we'll cover

SOC operating model and scope 
People, process, and technology as building blocks of an effective SOC 
Maturity assessment approach — from current to target state
Use-case engineering and detection coverage (MITRE ATT&CK mapping) 
Incident response workflow 
SOC metrics and KPIs 
Automation and orchestration 
Log strategy and data quality 
Integration with IT and business (ITSM, vulnerability-, compliance management, ownership)
Continuous improvement and roadmap (quick wins vs. long-term capability build)

our speaker

Michael Kropyva

Over 20 years of hands-on experience in cybersecurity. Michael specializes in building and optimizing Cyber Security Operations Centers (CSOCs) to deliver 24/7 threat detection, proactive response, and resilience against emerging risks.

 

He holds extensive expertise in lots of security standards and frameworks like SOC2, ISO27701, and achieved Lead Implementer and Lead Auditor certifications for ISO/IEC 27001, ISO/IEC 20000, and ISO/IEC 42001, acquired through EY.

SoftServe

It has more than 30 years in delivering digital solutions to enterprise industries, including high tech, financial services, healthcare, life sciences, retail, energy, and manufacturing using innovative technologies such as digital engineering, data and analytics, cloud, and AI/ML.

The company continuously expands the horizons of new technologies to solve today’s complex business challenges and achieve meaningful results.

who'll find it useful

IT and cybersecurity students who want to understand how a modern SOC works in practice, including processes and technologies
Junior cybersecurity specialists who are interested in how SOC workflow looks in practice — from attack detection scenarios to automation (SOAR, playbooks)

Step-by-step intro to SOC starts from step 1: registration.

Register

You may be interested in

Upcoming online event

SET Open Day: Master’s 2026

6 / 3 / 26, 18:00
Upcoming online event

A Scalable Business: How to Prepare a Startup for Growth and Investment

2 / 3 / 26, 17:00
Past online event

Full Scholarship to the UC Berkeley Haas MBA: How to Prepare and Apply

11 / 2 / 26, 19:00
We use cookies to improve your experience.