• Techniques for evaluating the extent of damage caused by cyber incidents
  • Assigning responsibilities and coordinating response efforts within the SOC team
  • Detecting and mitigating real-life advanced persistent threats (APTs) in a simulated environment