New release : CTI Report - Pharmaceutical and drug manufacturing 

                 Download now

Training: Crisis Management, Journalism Policy Workshop

Reference : CERT-WPJ

Duration : 1 day

Audience : CISOs, system administrators, SOC analysts

Prerequisites: Basic knowledge of IT administration and security.

Introduction :
An effective logging policy forms the basis of robust security monitoring and accelerates incident investigations. This workshop draws on the field experience of CERT Intrinsec to identify common weaknesses revealed by processed incidents, such as failures in the early detection of attacks (exfiltration, data encryption). Participants will learn how to configure logs tailored to attacker techniques (MITRE ATT&CK), covering proxy, firewall, EDR, Sysmon, and Active Directory.

Educational Objectives

  • Understanding the impact of inadequate logging on incident detection and response.
  • Identify critical logs by attack scenario (drive-by, phishing, public exploitation).
  • Implement practical recommendations: minimum sizes (1-2 GB workstations/servers), key Event IDs (4688, 4104, Sysmon 1) and PowerShell/Sysmon activation
  • Evaluate and prioritize log sources (SIEM, DNS, Event ID 4624/4625 authentications).

Detailed Program

  • Breakfast & round table (30 min)
  • Context and Lessons Learned (1h30min): Analysis of CERT incidents showing logging failures.
  • Break: (15 min)
  • Practical Recommendations (30min): Minimum configuration, points of attention (quantities, default mechanisms), hands-on workshops.
  • Lunch break (1 hour)
  • PART 1 Attack Scenarios and Key Logs (1h30): Drive-by compromised (proxy/firewall/Sysmon), public exploit (WAF/EDR), phishing (PowerShell 4104), persistence/discovery (4688)
  • Break (15 min)
  • PART 2 Attack Scenarios and Key Logs (1h30): Drive-by compromised (proxy/firewall/Sysmon), public exploit (WAF/EDR), phishing (PowerShell 4104), persistence/discovery (4688)
  • Conclusion and Q&A (30 min): Personalized action plan, SIEM integration.

Maximum number of people 6 to 8 people max

Offer subject to conditions : minimum number of 4 participants reached

Customer reviews

Why choose Intrinsec?

Trainers directly from CERT, SOC and GRC Intrinsec

Real-life case studies based on actual incidents handled in 10+ sectors

Full alignment with your tools, repositories, and environment typology

Methodology based on MITER ATT&CK, DFIR, NIST, ISO

Possible integration into your HR/ISO compliance/internal campus programs

Would you like to register for our journalism policy workshop?

Name