Building a Successful Security Operations Center (SOC) – Part One

Photo credit pixabay

Photo credit pixabay

Building a successful security operations center is a significant undertaking. One needs to consider a number of aspects when making a strategic decision about SOC implementation. To cover major SOC considerations, we are going to publish multiple articles about building SOC. This is the first one of the series.

Success of SOC is a combination of good planning, selection of appropriate tools, executive sponsorship, and a strong focus on people working in SOC

The objective of this article is to paint a very high level picture about SOC components and general considerations. Following are few ideas to think about before starting your SOC journey. Read more

, ,

Security Operations Center (SOC) Team Development

Programming editor for CSS language

Image Credit Pexels

Building a SOC is on every organization’s TODO list these days, at least since the Target breach if not before. Following are few unique characteristics about the SOC that I have observed from my experience of building a SOC in last three years.

The SOC team has an interactive role within the team as well as with the broader IT organization. As a team, you are always being tested. You are tested by your internal users, as well as by your adversaries (outside hackers) on a continuous basis. Read more

, ,

Want to be a CISO? Career Advice from David Garcia

Image Credit - Pexels

Image Credit – Pexels

Like any other field, many people in the field of information security are asking for career advice. Recently we had conversation with David Garcia, specializing in executive recruiting in the field of information security. He typically works with CISOs and VPs of Sales to fulfill their staffing needs. David’s firm, Garcia and Associates, made placements in thirteen states and two countries over the past year. David shared his insights into what it means to be a security leader, skill sets that are in demand, and how to make progress your career. Following is the Question/Answer session with David. Read more

, ,

Disruptive Technologies Every CISO Should Know

Image Credit - Pexels

Image Credit – Pexels

Information Security is a rapidly changing field as advancements due to disruptive technologies, like SDN, IoT, NFV and others, have direct impact on security management programs. Information Security professionals, in general, are perceived to be slow in  adapting to new technologies and are many times considered a road block. This perception must change and this post is an effort in this regard. Read more