A security operations centre (SOC) is like a machine. But like a machine, when one component is not working, performance can come to a standstill.
Among the various elements — people, process, and technology — that are required to run an effective security operation, people are arguably the most important.
A documented hiring strategy that addresses the goals of your security operation, chosen staffing model, required positions, and budget will help you build an effective team and identify gaps in your team.
You can use this handbook as a guide to create a strategy to find, hire, and retain top talent for your security operation regardless of your staffing model.
Amid a slew of statistics on how job stress is impacting security professionals, we sought to learn the causes of the tension and anxiety — as well understand potential ways teams might alleviate and remediate the potential of job burnout. Our...
As a CISO, your success rides on your ability to demonstrate the meaningful business impact and value of your security program or initiative to your company’s board. CISOs who are unable to articulate their organisation’s risk posture, explain...
To mature your security operations centre (SOC) and security operations program, you need to evaluate its effectiveness. But measuring your security operations program effectiveness isn’t an easy task. If showing the effectiveness of your security...
This white paper explains in detail how MITRE ATT&CK is an open framework and knowledge base. ATT&CK provides a common taxonomy of the tactical objectives of adversaries and their methods. There are many valuable uses for such objectives and...
Risikofaktor Benutzerdaten: So schützen Sie Ihre IT-Umgebung mit UEBA Die Benutzer – das schwächste Glied in der Kette Sie müssen eine ständige Flut von Bedrohungen bewältigen, von denen Sie manchmal nicht einmal wissen, dass sie existieren....
DIE DIE RANSOMWARE-BEDROHUNG: RANSOMWARE-BEDROHUNG: SOSO ERKENNEN ERKENNEN SIE SIE EINEN EINEN ANGRIFF, ANGRIFF, BEVOR BEVOR ESES ZUZU SPÄT SPÄT IST IST Eine Eineschnell schnellwachsende wachsendeBedrohung: Bedrohung:Eine EineGeißel Geißelnamens...
Mobile ransomware: Like most cybercrime trends, what starts on the desktop will eventually spread to the smartphone and tablet. Mobile ransomware works differently to its desktop counterpart but the aim is the same – to prevent users being able to...
The future of artificial intelligence The next stage for AI security will be a shift to the cloud. Hosted systems will offer more scalability – unlike on-premise systems that can quickly become overloaded when searching for suspect behaviour...
HOW TO BUILD A SOC WITH LIMITED RESOURCES Introduction Some organisations have formal security operations centres (SOCs). Formal 24x7 SOCs are tightly secured areas where teams of dedicated analysts carefully monitor for threats around the clock,...
Reconnaissance This stage represents human activity on the part of attackers as they research, identify and select their victims with activities such as scanning social networking sites, harvesting emails and looking for confidential information....
TABLE OF CONTENTS Table of Contents INTRODUCTION.......................................................................................................................................................................................................4...
THE THREAT LIFECYCLE MANAGEMENT FRAMEWORK Preface Globally, sophisticated cyber-attacks are compromising organisations at an unprecedented rate and with devastating consequences. Modern attackers, including criminal organisations, ideological...
DETECTING COMPROMISED SYSTEMS Introduction The external threat is one of the most high-profile risks that organisations face. Representing more than 80 percent of attacks today, external attackers look to take advantage of network and user...
Definitive Guide TM to Security Intelligence and Analytics Karen Scarfone, CISSP, ISSAP Steve Piper, CISSP Foreword by Robert Lentz, Former CISO for the U.S. Department of Defense Definitive Guide™ to Security Intelligence and Analytics Published...