Operational Security: Monitoring, Response & Resilience in Practice
Learn how to effectively monitor, respond to, and build resilience against security threats in practice at our online event!
Date and time
Location
Online
Good to know
Highlights
- 2 hours
- Online
Refund Policy
About this event
Introduction
This half-day course gives IT and security teams the tools to detect, respond to, and recover from incidents with confidence. From smart logging strategies to ransomware resilience, participants will learn how to build reliable, testable security operations without burnout or budget bloat.
Why this course matters
In many breaches, the problem isn’t detection capability, it’s alert overload, poor planning, or untested recovery. This course helps your team focus on what matters: visibility, response readiness, and building resilient systems that can bounce back fast.
Topics covered
- Logging, monitoring, and reducing fatigue: Normalised log formats, centralised ingestion, detection engineering, and avoiding alert fatigue
- Incident response playbooks & tabletop drills: Building concise run-books, roles & escalation paths, evidence preservation, and post-incident reviews
- Backup, recovery & ransomware resilience: 3-2-1 rule, immutability, offline copies, recovery-time objectives vs. recovery-point objectives, regular restore tests
- Patching & Prioritisation: Risk-based triage and remediation planning (KEV, EPSS), automating patching, asset management and tracking
Key Take-away
From this course, you will:
- Understand practical frameworks for threat detection and monitoring
- Learn how to build and execute effective incident response processes
- Develop reliable backup and recovery strategies to improve resilience
- Prioritise and automate patching using risk-based approaches
- Access ready-to-use playbooks and tools to strengthen operational security posture
Who should attend
SOC analysts, IT admins, infrastructure engineers, incident responders, and security managers are looking to improve day-to-day operational resilience.
Delivery
Live online delivery
Contact us for face-to-face / private sessions.
Facilitators
Neil Richardson – Co-Founder & Managing Director | Cyber Alchemy
Neil has 15+ years of experience in cybersecurity, split between academia and strategic advisory roles. A former senior lecturer and now a fractional CISO to scale-ups, Neil specialises in aligning security with growth, helping companies protect funding rounds, launch securely, and simplify compliance. His experience includes 200+ strategic engagements and hands-on DevSecOps implementation for clients across fintech and medtech. A former Cyber Scheme Team Leader and CREST tester, Neil brings senior-level clarity to every course, making secure development something teams actually want to do.
Luke Hill – Co-Founder & Director | Cyber Alchemy
Luke brings eight years of security experience across offensive testing, compliance, and operations, with a focus on infrastructure, cloud, and OT security. He’s assessed everything from medical devices to fintech platforms and is an expert in identifying misconfigurations, attack paths, and hardening gaps across complex environments. Holding AZ-500 and Cyber Scheme Team Member certifications, Luke’s training style is clear, pragmatic, and full of real-world war stories. He also leads weekly hacking labs for university students and contributes to bug bounty and security research projects.
Ali Malik – Co-Founder & Director | Cyber Alchemy
Ali brings over a decade of experience in cybersecurity, paired with eight years in software engineering, making him a rare hybrid who understands what secure development actually looks like in the real world. He’s a specialist in offensive security, DevSecOps, and secure software delivery in regulated industries like MedTech and EdTech. Holding Cyber Scheme Team Leader and ISO 27001 Lead Auditor certifications, Ali regularly advises on integrating security seamlessly into the development lifecycle. Beyond consultancy, he mentors students, leads Capture The Flag competitions, and keeps Cyber Alchemy at the cutting edge of secure development practices.