SlideShare a Scribd company logo
1 of 41
Download to read offline
Building a Security Operations
         Center (SOC)
                 1




     Ben Rothke, CISSP, PCI QSA
     Senior Security Consultant
         BT Global Services
        ben.rothke@bt.com
Agenda
                     2

Introduction
Need for a Security Operations Center (SOC)
Components of an effective SOC
Deciding to insource or outsource the SOC
SOC requirements
Q/A
About me
                      3

Senior Security Consultant – BT Global
Services
Certifications: CISSP, CISM, PCI QSA, CISA,
CCO, SITA, Dad
IT sector since 1988 and information security
since 1994
Frequent writer and speaker
Author - Computer Security: 20 Things Every
Employee Should Know
Current Security Challenges
                      4


Onslaught of security data from disparate
systems, platforms and applications
Numerous point solutions (antivirus, firewalls,
IDS/IPS, ERP, access control, IdM, SSO, etc.)
Millions of messages daily
Attacks becoming more frequent and
sophisticated
Regulatory compliance issues place
increasing burden on systems and network
administrators
Current Climate
                                5

Most organizations inadequately prepared to
deal with intrusions and security incidents
 Address issue only after a serious breach occurs
When incident occurs, decisions made in
haste, which reduces ability to:
 Understand extent and source of incident
 Protect sensitive data contained on systems
 Protect systems/networks and their ability to continue operating as
 intended and recover systems
 Collect information to understand what happened. Without such
 information, you may inadvertently take actions that can further
 damage your systems
 Support legal investigations and forensics
Current SOC Climate
                         6

In recent years, the complexity of managing a
SOC has increased exponentially
Security operations is not just about
perimeter threats anymore
 Array of hundreds of event sources - firewalls, IPS,
 IDS, proxy information, applications, identity
 management, database, router, switch, merchant/PCI,
 physical security devices and more
SOC’s are aggregation points of tens of
millions of daily events that must be
monitored, logged, analyzed and correlated
Why do you need a SOC?
                           7

Designed to be nucleus of all your information
and Internet security operations
Provides:
 Continuous prevention
 Protection
 Detection
 Response capabilities against threats, remotely
 exploitable vulnerabilities and real-time incidents on
 your networks
Works with CIRT to create comprehensive
infrastructure for managing security ops
SOC Benefits
                         8

Speed of response time
 Malware can spread throughout the Internet in
 minutes or even seconds, potentially knocking out
 your network or slowing traffic to a crawl
Consequently, every second counts in
identifying these attacks and negating them
before they can cause damage
Ability to recover from a DDoS attack in a
reasonable amount of time
Integrated SOC
      9




                 IBM
SOC Functions
                         10

Real-time monitoring / management
 Aggregate logs
 Aggregate data
 Coordinate response and remediation
Reporting
 Executives
 Auditors
 Security staff
Post-incident analysis
 Forensics
 Investigation
SOC Requirements
                          11

Trained staff
Good management
Adequate budget
 Typically, only largest companies have resources to
 build and staff a dedicated SOC
Good processes
Integration into incident response
SOC Planning
                                      12

Full audit of existing procedures, including informal and
ad-hoc
Independent consultants to advise on industry best
practices
Planning of location, resources, training programs, etc.
But plans change; don’t try to prepare everything ahead
of time
  Sometimes best approach is not clear until you have actually started

But plans change; don’t try to prepare everything ahead
of time
  Sometimes best approach is not clear until you have actually started

Build it like an aircraft carrier
  Change built into the design
SIM Tool
                             13

Many SOC benefits come from good SIM tool
 Consolidates all data and analyzes it intelligently
 Provides visualization into environment
SOC is inefficient if overwhelmed with data
SIM and configuring it is key
Define requirements first
Choose SIM that’s flexible and agile, plus:
 Priority determination
 Real-time correlation
 Cross-device correlation
 Audit and compliance
 Track and escalate according to threat level
SIM Automation
                                                     14
IDS/IPS   Firewalls/VPNs    Routers      Business Applications

 Access Control   Databases      Web Servers

   Network   O/S Desktops       Others




                      3 Million                           Messages Received


                      186,000                             Alerts Processed


                           180                            Tickets Analyzed

                            3
                                                                        Direct SOC analyst handled
Challenge of SIM & Automation
                         15

A well-configured SIM can automate much of
the SOC process. But…
“The more advanced a control system is, so
the more crucial may be the contribution of
the human operator”
 Ironies of Automation - Lisanne Bainbridge
Don’t get caught in the hype that a SIM can
replace SOC analysts
SOC Setup
                           16

Recruitment
 Skill sets required for broad range of technologies
 Determine at what stage to bring staff on board, and
 in what quantity
Training plan
Infrastructure
 Create procedures on how you can ensure your
 availability and ability to work, even in an outage
Determine where the SOC should be located
 With IT Security, NOC, elsewhere?
SOC Development
                           17

Procedures must be continually revised, as
technologies advance, and experience shows
how to improve
As the team develops, more skilled work can
be taken on, and range of services expanded
 Good for team morale, as well as providing a better
 service
SOC runbook must be kept updated, and be
tightly revision controlled
 Kept in central location so old versions cannot circulate
Which SOC?
                        18

Outsourced
 BT Managed Security Solutions (formerly BT
 Counterpane), Symantec, SecureWorks, Solutionary,
 WiPro, Tata, Savvis, McAfee, Verizon (Cybertrust /
 Ubizen), Orange, Integralis, Verizon, Sprint, EDS,
 Qwest iQ Managed Security Service, Unisys and more


Centralized group within enterprise
 Corporate SOC
Outsourced SOC
                           19
Advantages                      Disadvantages
Avoid capital expenses –
it’s their hardware &           Contractors will never
software                        know your environment
Often cheaper than in-          like internal employees
house                           Sending jobs outside
Less potential for              organization can lower
collusion between               morale
monitoring team and
                                Lack of capital retention
attacker
                                Risk of external data
Good security people are
                                mishandling
difficult to find
Unbiased
SLA
Outsourced SOC – General Questions
                      20


1. What is its reputation?
2. Who are its customers?
3. Does it already service customers in my
   industry?
4. Does it service customers my size?
5. How long have its customers been with it?
6. What is its cancellation/non-renew rate?
Outsourced SOC – Staffing Questions
                             21

1. What is the experience of its staff?
2. Does it hire reformed hackers?
3. Are background checks performed on all new
     employees?
4.   Does it use contractors for any of its services?
5.   Are personnel held to strict confidentiality
     agreements?
6.   What is the ratio of senior engineers to managed
     clients?
7.   What certifications are held by senior/junior staff?
8.   What is its employee turnover rate?
Outsourced SOC – Stability Questions
                               22

1. Is it stable?
2. Does it have a viable business plan?
3. How long has it been in business?
4. Positive signs of growth from major clients?
5. Consistent large account wins / growing revenue?
6. What is its client turnover rate?
7. What are its revenue numbers?
  •     If private and unwilling to share this information,
        ask for percentages rather than actual numbers
8. Will it provide documentation on its internal
      security policies and procedures?
Outsourced SOC - Sizing / Costs
                          23

Must provide services for less than in-house
solutions would cost
Can spread out investment in analysts,
hardware, software, facilities over several
clients
How many systems will be monitored?
How much bandwidth is needed?
Potential tax savings
 Convert variable costs (in-house) to fixed costs
 (services)
Outsourced SOC – Performance Metrics
                          24

Must provide client with an interface providing
detailed information
 Services being delivered
 How their security posture relates to overall industry
 trends
Provide multiple views into the organization
Various technical, management and executive
reports
Complete trouble ticket work logs and notes
Outsourced SOC – SLA’s
                          25

Well-defined SLA’s
 processes and time periods within which they will
 respond to any security need.
 SLA should include specific steps to be taken
 Procedures the company takes to assure that the
 same system intrusions do not happen again
 Guarantee of protection against emerging threats
 Recovers losses in the event service doesn’t deliver as
 promised
 Commitments for initial device deployment, incident
 response/protection, requests for security policy &
 configuration changes, acknowledgement of requests
Outsourced SOC - Transitioning
                          26

Ensure adequate knowledge transfer
Create formal service level performance
metrics
 Establish a baseline for all negotiated service levels
 Measure from the baseline, track against it, adjusting
 as necessary.
Create internal CIRT
 Identify key events and plan the response
Hold regular transition & performance reviews
Be flexible
 Schedule formal review to adjust SLA’s after 6 months
 of service operation and periodically thereafter.
Outsourced SOC – Termination
                          27

All outsourcing contracts must anticipate the
eventual termination at the end of the
contract and plan for an orderly in-house
transition or a transition to another provider
Develop an exit strategy
 Define key resources, assets and process
 requirements for continued, effective delivery of the
 services formerly provided by the outgoing provider
Internal SOC
  Advantages                  28    Disadvantages

• Knows environment                • Larger up-front
  better than a third-party          investment
• Solutions are generally          • Higher pressure to
  easier to customize                show ROI quickly
• Potential to be most             • Higher potential for
  efficient                          collusion between
                                     analyst and attacker
• Most likely to notice
  correlations between             • Less likely to recognize
  groups                             large-scale, subtle
                                     patterns that include
• Better tool pricing –              multiple groups
  higher volume
Internal SOC - Questions
                         29

1. Does your staff have the competencies
     (skills and knowledge) to manage a SOC?
2.   How do you plan to assess if they really do
     have those competencies?
3.   Are you willing to take the time to document
     all of the SOC processes and procedures?
4.   Who’s going to develop a training program?
5.   Who’s going to design the physical SOC site?
6.   Can you hire and maintain adequate staff
     levels?
Internal SOC Success Factors
                              30

1. Trained staff
2. Good management
3. Adequate budget
4. Good processes
5. Integration into incident response
 If your organization can’t commit to these five
 factors, do not build an internal SOC – it will fail
   Will waste money and time and create false sense of security
 If you need a SOC but can’t commit to these factors,
 strongly consider outsourcing
SOC Mistakes
                              31

Huge waste of money
False sense of security
Miss active attacks
Compliance issues and violations
Much more likely to violate privacy laws
 Federal / State
 EU Privacy Directives



   SOC success ultimately dependent on quality of SOC staff
 Staff success ultimately dependent on quality of SOC manager
SOC Analysts
                                         32

Good SOC analysts hard to find, hard to keep
 Have combination of technical knowledge and
 technical aptitude
Hire experienced SOC analysts
 Pay them well
 You get what you pay for
Skill sets                               •   Directories
 •   Operating system proficiency
                                         •   Routers/switches/firewalls
 •   Network protocols
                                         •   Programming
 •   Chain of custody issues
                                         •   Databases
 •   Ethics
                                         •   IDS
 •   Corporate policy
                                         •   Investigative processes
 •   Services
                                         •   Applications
 •   Multiple hardware platforms
                                         •   and much more
 •   Attacks
SOC Analysts - Qualities
                          33

Extremely curious
 Ability & desire to find answers to difficult problems
 and situations
Abstract thinker
 Can correlate IDS incidents and alerts in real-time
Ethical
Deals with low-level details while keeping
big-picture view of situation
Can communicate to various groups that
have very different requirements
Responds well to frustrating situations
SOC Analyst Burnout
                       34

SOC analysts can burnout
Have a plan to address this
 Extensive training
 Bonuses
 Promotions
 Management opportunities
 Job rotation
SOC Management
                    35

Management and supervision of a SOC is a
key factor to ensure its efficiency
While analysts, other staff, hardware and
software are key elements, a SOC’s ultimate
success is dependant on a competent SOC
manager.
Inadequate/poor management has significant
consequences, from process performance
decrements, to incidents being missed or
incorrectly handled
SOC Processes
                        36

SOC heavily process-driven
Processes work best when documented in
advance
Usability and workflow critical
Documentation
 Adequate time must be given to properly document
 many different SOC functions
 Corporate networks and SOC are far too complex to be
 supported in an ad-hoc manner
 Documentation makes all the difference
SOC Processes ToC
    37
SOC Metrics
                     38

Measured by how quickly incidents are:
 Identified
 Addressed
 Handled
Must be used judiciously
Don’t measure base performance of an
analyst simply on the number of events
analyzed or recommendations written
Additional references
     39
Conclusions
                      40

Building a SOC is complex
SOC is the foundation of your organization’s
security management program
Multiple organizational and technical issues
should be considered when planning and
evaluating a SOC
Potential benefits of a SOC are enormous
Planning and requirements definition are crucial
But if you do this right, your security benefits
will be immense
Thanks for attending - Q/A
                   41

Ben Rothke, CISSP PCI QSA
Senior Security Consultant
BT Professional Services
ben.rothke@bt.com

www.linkedin.com/in/benrothke
www.twitter.com/benrothke

More Related Content

What's hot

Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMEAlienVault
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterMichael Nickle
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)Ahmed Ayman
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited ResourcesLogRhythm
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center FundamentalAmir Hossein Zargaran
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)Shah Sheikh
 
SOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOCSOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOCPriyanka Aash
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations centerCMR WORLD TECH
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & BuildSameer Paradia
 
SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?Jonathan Sinclair
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controlsAlienVault
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centersBrencil Kaimba
 
When and How to Set up a Security Operations Center
When and How to Set up a Security Operations CenterWhen and How to Set up a Security Operations Center
When and How to Set up a Security Operations CenterKomand
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmPriyanka Aash
 
Bulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalBulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalMahmoud Yassin
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 
WHY SOC Services needed?
WHY SOC Services needed?WHY SOC Services needed?
WHY SOC Services needed?manoharparakh
 

What's hot (20)

Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
SOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOCSOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOC
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
 
Soc
SocSoc
Soc
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 
SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
 
SOC and SIEM.pptx
SOC and SIEM.pptxSOC and SIEM.pptx
SOC and SIEM.pptx
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
 
When and How to Set up a Security Operations Center
When and How to Set up a Security Operations CenterWhen and How to Set up a Security Operations Center
When and How to Set up a Security Operations Center
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Bulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalBulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat Landscapefinal
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
WHY SOC Services needed?
WHY SOC Services needed?WHY SOC Services needed?
WHY SOC Services needed?
 

Viewers also liked

Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...IBM Security
 
about soc 2016 website version
about soc 2016 website versionabout soc 2016 website version
about soc 2016 website versionMichael R
 
Cyber incident response or how to avoid long hours of testimony
Cyber incident response or how to avoid long hours of testimony Cyber incident response or how to avoid long hours of testimony
Cyber incident response or how to avoid long hours of testimony David Sweigert
 
Challenges and Benefits of Information Security Management
Challenges and Benefits of Information Security ManagementChallenges and Benefits of Information Security Management
Challenges and Benefits of Information Security ManagementConferencias FIST
 
Build, Manage and Grow Your Services Business with IBM Chicago Briefing Prese...
Build, Manage and Grow Your Services Business with IBM Chicago Briefing Prese...Build, Manage and Grow Your Services Business with IBM Chicago Briefing Prese...
Build, Manage and Grow Your Services Business with IBM Chicago Briefing Prese...sandrahulvat
 
Information security challenges in today’s banking environment
Information security challenges in today’s banking environmentInformation security challenges in today’s banking environment
Information security challenges in today’s banking environmentEvan Francen
 
SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
 SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera... SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...AlienVault
 
Open Security Operations Center - OpenSOC
Open Security Operations Center - OpenSOCOpen Security Operations Center - OpenSOC
Open Security Operations Center - OpenSOCSheetal Dolas
 
Incident Response Swimlanes
Incident Response SwimlanesIncident Response Swimlanes
Incident Response SwimlanesDaniel P Wallace
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1Priyanka Aash
 
Incident Response Triage
Incident Response TriageIncident Response Triage
Incident Response TriageAlbert Hui
 
The Six Stages of Incident Response
The Six Stages of Incident Response The Six Stages of Incident Response
The Six Stages of Incident Response Darren Pauli
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services OverviewCasey Lucas
 
Building an Analytics Enables SOC
Building an Analytics Enables SOCBuilding an Analytics Enables SOC
Building an Analytics Enables SOCSplunk
 

Viewers also liked (18)

Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
about soc 2016 website version
about soc 2016 website versionabout soc 2016 website version
about soc 2016 website version
 
Cyber incident response or how to avoid long hours of testimony
Cyber incident response or how to avoid long hours of testimony Cyber incident response or how to avoid long hours of testimony
Cyber incident response or how to avoid long hours of testimony
 
Challenges and Benefits of Information Security Management
Challenges and Benefits of Information Security ManagementChallenges and Benefits of Information Security Management
Challenges and Benefits of Information Security Management
 
Build, Manage and Grow Your Services Business with IBM Chicago Briefing Prese...
Build, Manage and Grow Your Services Business with IBM Chicago Briefing Prese...Build, Manage and Grow Your Services Business with IBM Chicago Briefing Prese...
Build, Manage and Grow Your Services Business with IBM Chicago Briefing Prese...
 
SOC 2 and You
SOC 2 and YouSOC 2 and You
SOC 2 and You
 
Information security challenges in today’s banking environment
Information security challenges in today’s banking environmentInformation security challenges in today’s banking environment
Information security challenges in today’s banking environment
 
SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
 SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera... SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
 
Open Security Operations Center - OpenSOC
Open Security Operations Center - OpenSOCOpen Security Operations Center - OpenSOC
Open Security Operations Center - OpenSOC
 
Incident Response Swimlanes
Incident Response SwimlanesIncident Response Swimlanes
Incident Response Swimlanes
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
Incident Response Triage
Incident Response TriageIncident Response Triage
Incident Response Triage
 
CSIRT_16_Jun
CSIRT_16_JunCSIRT_16_Jun
CSIRT_16_Jun
 
The Six Stages of Incident Response
The Six Stages of Incident Response The Six Stages of Incident Response
The Six Stages of Incident Response
 
Top 5 IT challenges for 2017
Top 5 IT challenges for 2017Top 5 IT challenges for 2017
Top 5 IT challenges for 2017
 
SIEM and SOC
SIEM and SOCSIEM and SOC
SIEM and SOC
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
 
Building an Analytics Enables SOC
Building an Analytics Enables SOCBuilding an Analytics Enables SOC
Building an Analytics Enables SOC
 

Similar to Rothke secure360 building a security operations center (soc)

Building a Security Operations Center (SOC).pdf
Building a Security Operations Center (SOC).pdfBuilding a Security Operations Center (SOC).pdf
Building a Security Operations Center (SOC).pdfTapOffice
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksAngeloluca Barba
 
How to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-SuiteHow to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-SuiteSurfWatch Labs
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentInfocyte
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
 
Communicating SOC Status
Communicating SOC StatusCommunicating SOC Status
Communicating SOC StatusAdam Alhafid
 
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEW
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEWFREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEW
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEWinfosec train
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackThousandEyes
 
Servers compliance: audit, remediation, proof
Servers compliance: audit, remediation, proofServers compliance: audit, remediation, proof
Servers compliance: audit, remediation, proofRUDDER
 
SOC 3.0: strategic threat intelligence May 2016
SOC 3.0: strategic threat intelligence May 2016SOC 3.0: strategic threat intelligence May 2016
SOC 3.0: strategic threat intelligence May 2016Sarah Bark
 
SOC Analyst Interview Questions & Answers.pdf
SOC Analyst Interview Questions & Answers.pdfSOC Analyst Interview Questions & Answers.pdf
SOC Analyst Interview Questions & Answers.pdfinfosec train
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 

Similar to Rothke secure360 building a security operations center (soc) (20)

Building a Security Operations Center (SOC).pdf
Building a Security Operations Center (SOC).pdfBuilding a Security Operations Center (SOC).pdf
Building a Security Operations Center (SOC).pdf
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
SOC Service in India.pdf
SOC Service in India.pdfSOC Service in India.pdf
SOC Service in India.pdf
 
How to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-SuiteHow to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-Suite
 
CA_Module_2.pdf
CA_Module_2.pdfCA_Module_2.pdf
CA_Module_2.pdf
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
Communicating SOC Status
Communicating SOC StatusCommunicating SOC Status
Communicating SOC Status
 
CISA (1).pdf
CISA (1).pdfCISA (1).pdf
CISA (1).pdf
 
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEW
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEWFREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEW
FREQUENTLY ASKED QUESTIONS IN CISA CERTIFIED ROL INTERVIEW
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
 
Servers compliance: audit, remediation, proof
Servers compliance: audit, remediation, proofServers compliance: audit, remediation, proof
Servers compliance: audit, remediation, proof
 
Security operations center inhouse vs outsource
Security operations center   inhouse vs outsourceSecurity operations center   inhouse vs outsource
Security operations center inhouse vs outsource
 
Security operations center inhouse vs outsource
Security operations center   inhouse vs outsourceSecurity operations center   inhouse vs outsource
Security operations center inhouse vs outsource
 
Managing security threats in today’s enterprise
Managing security threats in today’s enterpriseManaging security threats in today’s enterprise
Managing security threats in today’s enterprise
 
SOC 3.0: strategic threat intelligence May 2016
SOC 3.0: strategic threat intelligence May 2016SOC 3.0: strategic threat intelligence May 2016
SOC 3.0: strategic threat intelligence May 2016
 
SOC Analyst Interview Questions & Answers.pdf
SOC Analyst Interview Questions & Answers.pdfSOC Analyst Interview Questions & Answers.pdf
SOC Analyst Interview Questions & Answers.pdf
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 

More from Ben Rothke

Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeterBen Rothke
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...Ben Rothke
 
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizationsBen Rothke
 
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke   rsa 2013 - deployment strategies for effective encryptionRothke   rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - deployment strategies for effective encryptionBen Rothke
 
E5 rothke - deployment strategies for effective encryption
E5   rothke - deployment strategies for effective encryptionE5   rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryptionBen Rothke
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systemsBen Rothke
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about themBen Rothke
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeterBen Rothke
 
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt   from national cyber security nationalcybersecurity comLessons from ligatt   from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity comBen Rothke
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligattBen Rothke
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothkeBen Rothke
 
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperInfosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperBen Rothke
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practicesBen Rothke
 
Rothke computer forensics show 2010
Rothke   computer forensics show 2010Rothke   computer forensics show 2010
Rothke computer forensics show 2010Ben Rothke
 
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeThe Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeBen Rothke
 
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS ComplianceWebinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS ComplianceBen Rothke
 
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui   un livre blanc clearswiftLa nécessité de la dlp aujourd’hui   un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswiftBen Rothke
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperBen Rothke
 
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010   Ben Rothke - social networks and information security Infotec 2010   Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security Ben Rothke
 
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...Ben Rothke
 

More from Ben Rothke (20)

Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
 
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizations
 
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke   rsa 2013 - deployment strategies for effective encryptionRothke   rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - deployment strategies for effective encryption
 
E5 rothke - deployment strategies for effective encryption
E5   rothke - deployment strategies for effective encryptionE5   rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryption
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systems
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt   from national cyber security nationalcybersecurity comLessons from ligatt   from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity com
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligatt
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
 
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperInfosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. Hooper
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practices
 
Rothke computer forensics show 2010
Rothke   computer forensics show 2010Rothke   computer forensics show 2010
Rothke computer forensics show 2010
 
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeThe Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - Rothke
 
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS ComplianceWebinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS Compliance
 
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui   un livre blanc clearswiftLa nécessité de la dlp aujourd’hui   un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswift
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
 
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010   Ben Rothke - social networks and information security Infotec 2010   Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security
 
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
 

Recently uploaded

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Recently uploaded (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

Rothke secure360 building a security operations center (soc)

  • 1. Building a Security Operations Center (SOC) 1 Ben Rothke, CISSP, PCI QSA Senior Security Consultant BT Global Services ben.rothke@bt.com
  • 2. Agenda 2 Introduction Need for a Security Operations Center (SOC) Components of an effective SOC Deciding to insource or outsource the SOC SOC requirements Q/A
  • 3. About me 3 Senior Security Consultant – BT Global Services Certifications: CISSP, CISM, PCI QSA, CISA, CCO, SITA, Dad IT sector since 1988 and information security since 1994 Frequent writer and speaker Author - Computer Security: 20 Things Every Employee Should Know
  • 4. Current Security Challenges 4 Onslaught of security data from disparate systems, platforms and applications Numerous point solutions (antivirus, firewalls, IDS/IPS, ERP, access control, IdM, SSO, etc.) Millions of messages daily Attacks becoming more frequent and sophisticated Regulatory compliance issues place increasing burden on systems and network administrators
  • 5. Current Climate 5 Most organizations inadequately prepared to deal with intrusions and security incidents Address issue only after a serious breach occurs When incident occurs, decisions made in haste, which reduces ability to: Understand extent and source of incident Protect sensitive data contained on systems Protect systems/networks and their ability to continue operating as intended and recover systems Collect information to understand what happened. Without such information, you may inadvertently take actions that can further damage your systems Support legal investigations and forensics
  • 6. Current SOC Climate 6 In recent years, the complexity of managing a SOC has increased exponentially Security operations is not just about perimeter threats anymore Array of hundreds of event sources - firewalls, IPS, IDS, proxy information, applications, identity management, database, router, switch, merchant/PCI, physical security devices and more SOC’s are aggregation points of tens of millions of daily events that must be monitored, logged, analyzed and correlated
  • 7. Why do you need a SOC? 7 Designed to be nucleus of all your information and Internet security operations Provides: Continuous prevention Protection Detection Response capabilities against threats, remotely exploitable vulnerabilities and real-time incidents on your networks Works with CIRT to create comprehensive infrastructure for managing security ops
  • 8. SOC Benefits 8 Speed of response time Malware can spread throughout the Internet in minutes or even seconds, potentially knocking out your network or slowing traffic to a crawl Consequently, every second counts in identifying these attacks and negating them before they can cause damage Ability to recover from a DDoS attack in a reasonable amount of time
  • 10. SOC Functions 10 Real-time monitoring / management Aggregate logs Aggregate data Coordinate response and remediation Reporting Executives Auditors Security staff Post-incident analysis Forensics Investigation
  • 11. SOC Requirements 11 Trained staff Good management Adequate budget Typically, only largest companies have resources to build and staff a dedicated SOC Good processes Integration into incident response
  • 12. SOC Planning 12 Full audit of existing procedures, including informal and ad-hoc Independent consultants to advise on industry best practices Planning of location, resources, training programs, etc. But plans change; don’t try to prepare everything ahead of time Sometimes best approach is not clear until you have actually started But plans change; don’t try to prepare everything ahead of time Sometimes best approach is not clear until you have actually started Build it like an aircraft carrier Change built into the design
  • 13. SIM Tool 13 Many SOC benefits come from good SIM tool Consolidates all data and analyzes it intelligently Provides visualization into environment SOC is inefficient if overwhelmed with data SIM and configuring it is key Define requirements first Choose SIM that’s flexible and agile, plus: Priority determination Real-time correlation Cross-device correlation Audit and compliance Track and escalate according to threat level
  • 14. SIM Automation 14 IDS/IPS Firewalls/VPNs Routers Business Applications Access Control Databases Web Servers Network O/S Desktops Others 3 Million Messages Received 186,000 Alerts Processed 180 Tickets Analyzed 3 Direct SOC analyst handled
  • 15. Challenge of SIM & Automation 15 A well-configured SIM can automate much of the SOC process. But… “The more advanced a control system is, so the more crucial may be the contribution of the human operator” Ironies of Automation - Lisanne Bainbridge Don’t get caught in the hype that a SIM can replace SOC analysts
  • 16. SOC Setup 16 Recruitment Skill sets required for broad range of technologies Determine at what stage to bring staff on board, and in what quantity Training plan Infrastructure Create procedures on how you can ensure your availability and ability to work, even in an outage Determine where the SOC should be located With IT Security, NOC, elsewhere?
  • 17. SOC Development 17 Procedures must be continually revised, as technologies advance, and experience shows how to improve As the team develops, more skilled work can be taken on, and range of services expanded Good for team morale, as well as providing a better service SOC runbook must be kept updated, and be tightly revision controlled Kept in central location so old versions cannot circulate
  • 18. Which SOC? 18 Outsourced BT Managed Security Solutions (formerly BT Counterpane), Symantec, SecureWorks, Solutionary, WiPro, Tata, Savvis, McAfee, Verizon (Cybertrust / Ubizen), Orange, Integralis, Verizon, Sprint, EDS, Qwest iQ Managed Security Service, Unisys and more Centralized group within enterprise Corporate SOC
  • 19. Outsourced SOC 19 Advantages Disadvantages Avoid capital expenses – it’s their hardware & Contractors will never software know your environment Often cheaper than in- like internal employees house Sending jobs outside Less potential for organization can lower collusion between morale monitoring team and Lack of capital retention attacker Risk of external data Good security people are mishandling difficult to find Unbiased SLA
  • 20. Outsourced SOC – General Questions 20 1. What is its reputation? 2. Who are its customers? 3. Does it already service customers in my industry? 4. Does it service customers my size? 5. How long have its customers been with it? 6. What is its cancellation/non-renew rate?
  • 21. Outsourced SOC – Staffing Questions 21 1. What is the experience of its staff? 2. Does it hire reformed hackers? 3. Are background checks performed on all new employees? 4. Does it use contractors for any of its services? 5. Are personnel held to strict confidentiality agreements? 6. What is the ratio of senior engineers to managed clients? 7. What certifications are held by senior/junior staff? 8. What is its employee turnover rate?
  • 22. Outsourced SOC – Stability Questions 22 1. Is it stable? 2. Does it have a viable business plan? 3. How long has it been in business? 4. Positive signs of growth from major clients? 5. Consistent large account wins / growing revenue? 6. What is its client turnover rate? 7. What are its revenue numbers? • If private and unwilling to share this information, ask for percentages rather than actual numbers 8. Will it provide documentation on its internal security policies and procedures?
  • 23. Outsourced SOC - Sizing / Costs 23 Must provide services for less than in-house solutions would cost Can spread out investment in analysts, hardware, software, facilities over several clients How many systems will be monitored? How much bandwidth is needed? Potential tax savings Convert variable costs (in-house) to fixed costs (services)
  • 24. Outsourced SOC – Performance Metrics 24 Must provide client with an interface providing detailed information Services being delivered How their security posture relates to overall industry trends Provide multiple views into the organization Various technical, management and executive reports Complete trouble ticket work logs and notes
  • 25. Outsourced SOC – SLA’s 25 Well-defined SLA’s processes and time periods within which they will respond to any security need. SLA should include specific steps to be taken Procedures the company takes to assure that the same system intrusions do not happen again Guarantee of protection against emerging threats Recovers losses in the event service doesn’t deliver as promised Commitments for initial device deployment, incident response/protection, requests for security policy & configuration changes, acknowledgement of requests
  • 26. Outsourced SOC - Transitioning 26 Ensure adequate knowledge transfer Create formal service level performance metrics Establish a baseline for all negotiated service levels Measure from the baseline, track against it, adjusting as necessary. Create internal CIRT Identify key events and plan the response Hold regular transition & performance reviews Be flexible Schedule formal review to adjust SLA’s after 6 months of service operation and periodically thereafter.
  • 27. Outsourced SOC – Termination 27 All outsourcing contracts must anticipate the eventual termination at the end of the contract and plan for an orderly in-house transition or a transition to another provider Develop an exit strategy Define key resources, assets and process requirements for continued, effective delivery of the services formerly provided by the outgoing provider
  • 28. Internal SOC Advantages 28 Disadvantages • Knows environment • Larger up-front better than a third-party investment • Solutions are generally • Higher pressure to easier to customize show ROI quickly • Potential to be most • Higher potential for efficient collusion between analyst and attacker • Most likely to notice correlations between • Less likely to recognize groups large-scale, subtle patterns that include • Better tool pricing – multiple groups higher volume
  • 29. Internal SOC - Questions 29 1. Does your staff have the competencies (skills and knowledge) to manage a SOC? 2. How do you plan to assess if they really do have those competencies? 3. Are you willing to take the time to document all of the SOC processes and procedures? 4. Who’s going to develop a training program? 5. Who’s going to design the physical SOC site? 6. Can you hire and maintain adequate staff levels?
  • 30. Internal SOC Success Factors 30 1. Trained staff 2. Good management 3. Adequate budget 4. Good processes 5. Integration into incident response If your organization can’t commit to these five factors, do not build an internal SOC – it will fail Will waste money and time and create false sense of security If you need a SOC but can’t commit to these factors, strongly consider outsourcing
  • 31. SOC Mistakes 31 Huge waste of money False sense of security Miss active attacks Compliance issues and violations Much more likely to violate privacy laws Federal / State EU Privacy Directives SOC success ultimately dependent on quality of SOC staff Staff success ultimately dependent on quality of SOC manager
  • 32. SOC Analysts 32 Good SOC analysts hard to find, hard to keep Have combination of technical knowledge and technical aptitude Hire experienced SOC analysts Pay them well You get what you pay for Skill sets • Directories • Operating system proficiency • Routers/switches/firewalls • Network protocols • Programming • Chain of custody issues • Databases • Ethics • IDS • Corporate policy • Investigative processes • Services • Applications • Multiple hardware platforms • and much more • Attacks
  • 33. SOC Analysts - Qualities 33 Extremely curious Ability & desire to find answers to difficult problems and situations Abstract thinker Can correlate IDS incidents and alerts in real-time Ethical Deals with low-level details while keeping big-picture view of situation Can communicate to various groups that have very different requirements Responds well to frustrating situations
  • 34. SOC Analyst Burnout 34 SOC analysts can burnout Have a plan to address this Extensive training Bonuses Promotions Management opportunities Job rotation
  • 35. SOC Management 35 Management and supervision of a SOC is a key factor to ensure its efficiency While analysts, other staff, hardware and software are key elements, a SOC’s ultimate success is dependant on a competent SOC manager. Inadequate/poor management has significant consequences, from process performance decrements, to incidents being missed or incorrectly handled
  • 36. SOC Processes 36 SOC heavily process-driven Processes work best when documented in advance Usability and workflow critical Documentation Adequate time must be given to properly document many different SOC functions Corporate networks and SOC are far too complex to be supported in an ad-hoc manner Documentation makes all the difference
  • 38. SOC Metrics 38 Measured by how quickly incidents are: Identified Addressed Handled Must be used judiciously Don’t measure base performance of an analyst simply on the number of events analyzed or recommendations written
  • 40. Conclusions 40 Building a SOC is complex SOC is the foundation of your organization’s security management program Multiple organizational and technical issues should be considered when planning and evaluating a SOC Potential benefits of a SOC are enormous Planning and requirements definition are crucial But if you do this right, your security benefits will be immense
  • 41. Thanks for attending - Q/A 41 Ben Rothke, CISSP PCI QSA Senior Security Consultant BT Professional Services ben.rothke@bt.com www.linkedin.com/in/benrothke www.twitter.com/benrothke