SlideShare une entreprise Scribd logo
1  sur  39
Télécharger pour lire hors ligne
Level Up Your SOC:
Guide for a Resilient Education Program
National Cyber Summit
Brandon DeVault
Principal Security Author, Pluralsight
Defensive Cyber Operations, Air National Guard
/in/brandon-devault @SolderSwag www.devaultsecurity.com
OUTCOMES!
How to assess your team
and adversary
How to build a sustainable
education plan
How to upgrade training to
meet advanced actor
capabilities
CLARIFICATION
AGENDA
1. Assessing the Adversary
2. Assessing the Defender
3. Defining Clear Roles
4. Creating the Plan
5. Tackling APTs
YOUR ADVERSARY SETS
THE STANDARD
CAPABILITIES
Lone Wolf
Hackers
Hacktivists Organized
Crime
APT Groups
RISK ANALYSIS
Cost vs. Skills
Lone Wolf
Hackers
Hacktivists Organized
Crime
APT
Groups
ASSESSING THE
DEFENDER
IMPLIED KNOWLEDGE
• Do you know what these things are?
SKILL IQ
DEFINING
CLEAR ROLES
CYBER CRIME INVESTIGATOR
WORK ROLE ID: 221
• “Knowledge of processes for seizing and preserving digital evidence (e.g., chain of
custody).”
• “Fuse computer network attack analyses with criminal and counterintelligence
investigations and operations.”
• “Assess the behavior of the individual victim, witness, or suspect as it relates to the
investigation.”
• “Provide criminal investigative support to trial counsel during the judicial process.”
DCWF ROLES
Cyber Defense
Analyst
Cyber Defense
Incident Responder
Cyber Defense
Threat Hunter
• Knowledge of the common
attack vectors on the
network layer.
• Skill in performing packet
level analysis.
• Identify and analyze
anomalies in network
traffic using metadata.
• Knowledge of malware
analysis concepts and
methodologies.
• Skill of identifying,
capturing, containing, and
reporting malware.
• Perform cyber defense
trend analysis and
reporting.
?
CASE STUDY
Current Roles
Intel
Identify
Protect
Detect
Respond
Recover
Emulate
Incident
Responder
SOC
Analyst
Threat
Hunter
Red Team
Operator
Forensic
Analyst
Security
Architect
Security
Engineer
Malware
Analyst
Exploit
Developer
Threat Intel
Analyst
Risk &
Governance
Manager
Compliance
Manager
IT
Auditor
Architecture
&
Engineering
Security
Operations
Governance,
Risk
&
Compliance
Penetration
Tester
Web App
Penetration
Tester
Vulnerability
Analyst
Pluralsight Security
Role Framework
Core Skill
Incident Response
Product/Tool Skills
IBM Security QRadar
Elastic Security
Network Security Monitoring with Suricata
Supplemental Skills
Python for Cyber Defense
Advanced Continuous Learning
Breaking News: Vulns, Exploits and Breaches
Relevant Certification Preparation
Cisco Certified CyberOps Associate
CompTIA Cybersecurity Analyst (CySA+)
Malware: Prevention, Detection, and Response
Network Attacks & Threats with Wireshark
Blue Team Tools
Incident
Responder
SOC
Analyst
Threat
Hunter
Red Team
Operator
Forensic
Analyst
Security
Architect
Security
Engineer
Malware
Analyst
Exploit
Developer
Threat Intel
Analyst
Risk &
Governance
Manager
Compliance
Manager
IT
Auditor
Architecture
&
Engineering
Security
Operations
Governance,
Risk
&
Compliance
Penetration
Tester
Web App
Penetration
Tester
Vulnerability
Analyst
Role-Centric Skill Development
Core Skill
Incident Response
Product/Tool Skills
IBM Security QRadar
Elastic Security
Network Security Monitoring with Suricata
Supplemental Skills
Python for Cyber Defense
Advanced Continuous Learning
Breaking News: Vulns, Exploits and Breaches
Relevant Certification Preparation
Cisco Certified CyberOps Associate
CompTIA Cybersecurity Analyst (CySA+)
PowerShell for Cyber Defense
Network Attacks & Threats with Wireshark
Blue Team Tools
Incident
Responder
SOC
Analyst
Threat
Hunter
Red Team
Operator
Forensic
Analyst
Security
Architect
Security
Engineer
Malware
Analyst
Exploit
Developer
Threat Intel
Analyst
Risk &
Governance
Manager
Compliance
Manager
IT
Auditor
Architecture
&
Engineering
Security
Operations
Governance,
Risk
&
Compliance
Penetration
Tester
Web App
Penetration
Tester
Vulnerability
Analyst
Role-Centric Skill Development
Core Skill
Incident Response
Product/Tool Skills
IBM Security QRadar
Elastic Security
Network Security Monitoring with Suricata
Supplemental Skills
Python for Cyber Defense
Advanced Continuous Learning
Breaking News: Vulns, Exploits and Breaches
Relevant Certification Preparation
Cisco Certified CyberOps Associate
CompTIA Cybersecurity Analyst (CySA+)
PowerShell for Cyber Defense
Network Attacks & Threats with Wireshark
Blue Team Tools
Incident
Responder
SOC
Analyst
Threat
Hunter
Red Team
Operator
Forensic
Analyst
Security
Architect
Security
Engineer
Malware
Analyst
Exploit
Developer
Threat Intel
Analyst
Risk &
Governance
Manager
Compliance
Manager
IT
Auditor
Architecture
&
Engineering
Security
Operations
Governance,
Risk
&
Compliance
Penetration
Tester
Web App
Penetration
Tester
Vulnerability
Analyst
Role-Centric Skill Development
Core Skill
Incident Response
Product/Tool Skills
IBM Security QRadar
Elastic Security
Network Security Monitoring with Suricata
Supplemental Skills
Python for Cyber Defense
Advanced Continuous Learning
Breaking News: Vulns, Exploits and Breaches
Relevant Certification Preparation
Cisco Certified CyberOps Associate
CompTIA Cybersecurity Analyst (CySA+)
PowerShell for Cyber Defense
Network Attacks & Threats with Wireshark
Blue Team Tools
Incident
Responder
SOC
Analyst
Threat
Hunter
Red Team
Operator
Forensic
Analyst
Security
Architect
Security
Engineer
Malware
Analyst
Exploit
Developer
Threat Intel
Analyst
Risk &
Governance
Manager
Compliance
Manager
IT
Auditor
Architecture
&
Engineering
Security
Operations
Governance,
Risk
&
Compliance
Penetration
Tester
Web App
Penetration
Tester
Vulnerability
Analyst
Role-Centric Skill Development
Core Skill
Incident Response
Product/Tool Skills
IBM Security QRadar
Elastic Security
Network Security Monitoring with Suricata
Supplemental Skills
Python for Cyber Defense
Advanced Continuous Learning
Breaking News: Vulns, Exploits and Breaches
Relevant Certification Preparation
Cisco Certified CyberOps Associate
CompTIA Cybersecurity Analyst (CySA+)
PowerShell for Cyber Defense
Network Attacks & Threats with Wireshark
Blue Team Tools
Incident
Responder
SOC
Analyst
Threat
Hunter
Red Team
Operator
Forensic
Analyst
Security
Architect
Security
Engineer
Malware
Analyst
Exploit
Developer
Threat Intel
Analyst
Risk &
Governance
Manager
Compliance
Manager
IT
Auditor
Architecture
&
Engineering
Security
Operations
Governance,
Risk
&
Compliance
Penetration
Tester
Web App
Penetration
Tester
Vulnerability
Analyst
Role-Centric Skill Development
Core Skill
Incident Response
Product/Tool Skills
IBM Security QRadar
Elastic Security
Network Security Monitoring with Suricata
Supplemental Skills
Python for Cyber Defense
Advanced Continuous Learning
Breaking News: Vulns, Exploits and Breaches
Relevant Certification Preparation
Cisco Certified CyberOps Associate
CompTIA Cybersecurity Analyst (CySA+)
PowerShell for Cyber Defense
Network Attacks & Threats with Wireshark
Blue Team Tools
Incident
Responder
SOC
Analyst
Threat
Hunter
Red Team
Operator
Forensic
Analyst
Security
Architect
Security
Engineer
Malware
Analyst
Exploit
Developer
Threat Intel
Analyst
Risk &
Governance
Manager
Compliance
Manager
IT
Auditor
Architecture
&
Engineering
Security
Operations
Governance,
Risk
&
Compliance
Penetration
Tester
Web App
Penetration
Tester
Vulnerability
Analyst
Role-Centric Skill Development
Core Skill
Incident Response
Product/Tool Skills
IBM Security QRadar
Elastic Security
Network Security Monitoring with Suricata
Supplemental Skills
Python for Cyber Defense
Advanced Continuous Learning
Breaking News: Vulns, Exploits and Breaches
Relevant Certification Preparation
Cisco Certified CyberOps Associate
CompTIA Cybersecurity Analyst (CySA+)
PowerShell for Cyber Defense
Network Attacks & Threats with Wireshark
Blue Team Tools
Incident
Responder
SOC
Analyst
Threat
Hunter
Red Team
Operator
Forensic
Analyst
Security
Architect
Security
Engineer
Malware
Analyst
Exploit
Developer
Threat Intel
Analyst
Risk &
Governance
Manager
Compliance
Manager
IT
Auditor
Architecture
&
Engineering
Security
Operations
Governance,
Risk
&
Compliance
Penetration
Tester
Web App
Penetration
Tester
Vulnerability
Analyst
Role-Centric Skill Development
Core Skill
Incident Response
Product/Tool Skills
IBM Security QRadar
Elastic Security
Network Security Monitoring with Suricata
Supplemental Skills
Python for Cyber Defense
Advanced Continuous Learning
Breaking News: Vulns, Exploits and Breaches
Relevant Certification Preparation
Cisco Certified CyberOps Associate
CompTIA Cybersecurity Analyst (CySA+)
PowerShell for Cyber Defense
Network Attacks & Threats with Wireshark
Blue Team Tools
Incident
Responder
SOC
Analyst
Threat
Hunter
Red Team
Operator
Forensic
Analyst
Security
Architect
Security
Engineer
Malware
Analyst
Exploit
Developer
Threat Intel
Analyst
Risk &
Governance
Manager
Compliance
Manager
IT
Auditor
Architecture
&
Engineering
Security
Operations
Governance,
Risk
&
Compliance
Penetration
Tester
Web App
Penetration
Tester
Vulnerability
Analyst
Role-Centric Skill Development
THE EDUCATION PLAN
CREATE A
LEVEL UP
APPROACH
THE PLAN
(AN APPROACH)
Initial Skills Training (IST)
• Fundamentals / Theory
Initial Qualification Training (IQT)
• Using the tools
Mission Qualification Training (MQT)
• Mission specific (environment)
Continuation Training
• Research,Workshops, and Conferences
CONSIDERATIONS
Assess potential
Vendors
Sustainable budget
Time commitment Ask your people!
ADVANCED PERSISTENT
THREATS
REACTIVE VS. PROACTIVE SECURITY
Reactive
• Security Analytics
• Incident Response
• Intrusion Detection Systems (IDS)
• Anti-virus / Anti-malware
Proactive
• Threat Hunting
• Threat Emulation
• Pen-testing
Intel
Identify
Protect
Detect
Respond
Recover
Emulate
MITRE ATT&CK
TECHNIQUES USED
TECHNIQUES USED
QUESTIONS?
• www.devaultsecurity.com
• linkedin.
• twitter. devaultsecurity.com
• github.
• brandon-devault@pluralsight.com
• https://app.pluralsight.com/profile/author/brandon-devault
}

Contenu connexe

Tendances

Manajemen Bencana
Manajemen BencanaManajemen Bencana
Manajemen Bencana
sigid_raja
 
Media equation theory
Media equation theoryMedia equation theory
Media equation theory
mankoma2013
 
CRITICAL APPRAISAL (Dra. Endang Lestari,Mpd,Mpd.Ked).pptx
CRITICAL APPRAISAL (Dra. Endang Lestari,Mpd,Mpd.Ked).pptxCRITICAL APPRAISAL (Dra. Endang Lestari,Mpd,Mpd.Ked).pptx
CRITICAL APPRAISAL (Dra. Endang Lestari,Mpd,Mpd.Ked).pptx
sakadoctors
 
Teori agenda setting
Teori agenda setting Teori agenda setting
Teori agenda setting
mankoma2013
 

Tendances (20)

Psikologi Komunikasi "Sistem Komunikasi Interpersonal"
Psikologi Komunikasi "Sistem Komunikasi Interpersonal"Psikologi Komunikasi "Sistem Komunikasi Interpersonal"
Psikologi Komunikasi "Sistem Komunikasi Interpersonal"
 
Manajemen Bencana
Manajemen BencanaManajemen Bencana
Manajemen Bencana
 
Creative planning; Proses Kreatif
Creative planning;  Proses KreatifCreative planning;  Proses Kreatif
Creative planning; Proses Kreatif
 
Sistem komunikasi massa.ppt
Sistem komunikasi massa.pptSistem komunikasi massa.ppt
Sistem komunikasi massa.ppt
 
Media equation theory
Media equation theoryMedia equation theory
Media equation theory
 
Ekowisata bahari
Ekowisata bahariEkowisata bahari
Ekowisata bahari
 
CRITICAL APPRAISAL (Dra. Endang Lestari,Mpd,Mpd.Ked).pptx
CRITICAL APPRAISAL (Dra. Endang Lestari,Mpd,Mpd.Ked).pptxCRITICAL APPRAISAL (Dra. Endang Lestari,Mpd,Mpd.Ked).pptx
CRITICAL APPRAISAL (Dra. Endang Lestari,Mpd,Mpd.Ked).pptx
 
Dasar dasar sinematografi
Dasar dasar sinematografiDasar dasar sinematografi
Dasar dasar sinematografi
 
Promosi Wisata Global di Era Digital - Kang Geri
Promosi Wisata Global di Era Digital - Kang GeriPromosi Wisata Global di Era Digital - Kang Geri
Promosi Wisata Global di Era Digital - Kang Geri
 
423956814-1-Pengantar-Sinematografi-ppt.ppt
423956814-1-Pengantar-Sinematografi-ppt.ppt423956814-1-Pengantar-Sinematografi-ppt.ppt
423956814-1-Pengantar-Sinematografi-ppt.ppt
 
Ekosistem hutan mangrove
Ekosistem hutan mangroveEkosistem hutan mangrove
Ekosistem hutan mangrove
 
pesan, propaganda & survey politik
pesan, propaganda & survey politikpesan, propaganda & survey politik
pesan, propaganda & survey politik
 
Creative Advertising
Creative AdvertisingCreative Advertising
Creative Advertising
 
Teori semiotika (Kelompok Komunikasi Massa)
Teori semiotika (Kelompok Komunikasi Massa)Teori semiotika (Kelompok Komunikasi Massa)
Teori semiotika (Kelompok Komunikasi Massa)
 
Ppt multimedia pembelajaran indah
Ppt multimedia pembelajaran indahPpt multimedia pembelajaran indah
Ppt multimedia pembelajaran indah
 
Cultivaion Theory
Cultivaion TheoryCultivaion Theory
Cultivaion Theory
 
presentasi hubungan antarpribadi
presentasi hubungan antarpribadipresentasi hubungan antarpribadi
presentasi hubungan antarpribadi
 
Daur hidup ikan lele by yazid alfa riko
Daur hidup ikan lele by yazid alfa rikoDaur hidup ikan lele by yazid alfa riko
Daur hidup ikan lele by yazid alfa riko
 
Teori agenda setting
Teori agenda setting Teori agenda setting
Teori agenda setting
 
Manajemen Media Sosial
Manajemen Media SosialManajemen Media Sosial
Manajemen Media Sosial
 

Similaire à Level up your SOC - Guide for a Resilient Education Program.pdf

Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0
Ferenc Fresz
 
V-Empower Services And Solutions
V-Empower Services And SolutionsV-Empower Services And Solutions
V-Empower Services And Solutions
guest609a5ed
 
CYBER SECURITY CAREER GUIDE CHEAT SHEET
CYBER SECURITY CAREER GUIDE CHEAT SHEETCYBER SECURITY CAREER GUIDE CHEAT SHEET
CYBER SECURITY CAREER GUIDE CHEAT SHEET
TravarsaPrivateLimit
 

Similaire à Level up your SOC - Guide for a Resilient Education Program.pdf (20)

Allianz Global CISO october-2015-draft
Allianz Global CISO  october-2015-draftAllianz Global CISO  october-2015-draft
Allianz Global CISO october-2015-draft
 
Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0Cyber_Services_2015_company_intro_ENG_v2p0
Cyber_Services_2015_company_intro_ENG_v2p0
 
V-Empower Services And Solutions
V-Empower Services And SolutionsV-Empower Services And Solutions
V-Empower Services And Solutions
 
V-Empower Services And Solutions
V-Empower Services And SolutionsV-Empower Services And Solutions
V-Empower Services And Solutions
 
2019 DerbyCon - Ryan Elkins - Scientific Computing for Information Security
2019 DerbyCon - Ryan Elkins - Scientific Computing for Information Security2019 DerbyCon - Ryan Elkins - Scientific Computing for Information Security
2019 DerbyCon - Ryan Elkins - Scientific Computing for Information Security
 
CYBER SECURITY CAREER GUIDE CHEAT SHEET
CYBER SECURITY CAREER GUIDE CHEAT SHEETCYBER SECURITY CAREER GUIDE CHEAT SHEET
CYBER SECURITY CAREER GUIDE CHEAT SHEET
 
Security assessment with a hint of CISSP Prep
Security assessment with a hint of CISSP PrepSecurity assessment with a hint of CISSP Prep
Security assessment with a hint of CISSP Prep
 
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
How to become a Cybersecurity Engineer? | Cybersecurity Salary | Cybersecurit...
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
 
INTERFACE by apidays 2023 - Security Exposure Management in API First World, ...
INTERFACE by apidays 2023 - Security Exposure Management in API First World, ...INTERFACE by apidays 2023 - Security Exposure Management in API First World, ...
INTERFACE by apidays 2023 - Security Exposure Management in API First World, ...
 
What are the best tools used in cybersecurity in 2023.pdf
What are the best tools used in cybersecurity in 2023.pdfWhat are the best tools used in cybersecurity in 2023.pdf
What are the best tools used in cybersecurity in 2023.pdf
 
The CISO Problems Risk Compliance Management in a Software Development 030420...
The CISO Problems Risk Compliance Management in a Software Development 030420...The CISO Problems Risk Compliance Management in a Software Development 030420...
The CISO Problems Risk Compliance Management in a Software Development 030420...
 
TSS - App Penetration Testing Services
TSS - App Penetration Testing ServicesTSS - App Penetration Testing Services
TSS - App Penetration Testing Services
 
Detection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day ThreatsDetection and Analysis of 0-Day Threats
Detection and Analysis of 0-Day Threats
 
IBM Qradar-Advisor
IBM Qradar-AdvisorIBM Qradar-Advisor
IBM Qradar-Advisor
 
Securing Applications
Securing ApplicationsSecuring Applications
Securing Applications
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..
 
Security Presenatation for Onforce Pro Town Hall
Security Presenatation for Onforce Pro Town HallSecurity Presenatation for Onforce Pro Town Hall
Security Presenatation for Onforce Pro Town Hall
 
The 4horsemen of ics secapocalypse
The 4horsemen of ics secapocalypseThe 4horsemen of ics secapocalypse
The 4horsemen of ics secapocalypse
 
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectionSymantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
 

Plus de Brandon DeVault

Plus de Brandon DeVault (13)

grrcon-2023-scheduled-tasks.pdf
grrcon-2023-scheduled-tasks.pdfgrrcon-2023-scheduled-tasks.pdf
grrcon-2023-scheduled-tasks.pdf
 
Toolkit Titans - Crafting a Cutting-Edge, Open-Source Security Operations Too...
Toolkit Titans - Crafting a Cutting-Edge, Open-Source Security Operations Too...Toolkit Titans - Crafting a Cutting-Edge, Open-Source Security Operations Too...
Toolkit Titans - Crafting a Cutting-Edge, Open-Source Security Operations Too...
 
Les Miserable Persistence - Hunting Through Scheduled Tasks - ShmooCon 2023.pdf
Les Miserable Persistence - Hunting Through Scheduled Tasks - ShmooCon 2023.pdfLes Miserable Persistence - Hunting Through Scheduled Tasks - ShmooCon 2023.pdf
Les Miserable Persistence - Hunting Through Scheduled Tasks - ShmooCon 2023.pdf
 
Tracing Transactions - BSides Orlando.pdf
Tracing Transactions - BSides Orlando.pdfTracing Transactions - BSides Orlando.pdf
Tracing Transactions - BSides Orlando.pdf
 
Log4Shell Case Study - Suricon2022.pdf
Log4Shell Case Study - Suricon2022.pdfLog4Shell Case Study - Suricon2022.pdf
Log4Shell Case Study - Suricon2022.pdf
 
Tracing Transactions - Threat Hunting for Financially Motivated APTs.pdf
Tracing Transactions - Threat Hunting for Financially Motivated APTs.pdfTracing Transactions - Threat Hunting for Financially Motivated APTs.pdf
Tracing Transactions - Threat Hunting for Financially Motivated APTs.pdf
 
Log4j vulnerability - CCC - Workshop.pdf
Log4j vulnerability - CCC - Workshop.pdfLog4j vulnerability - CCC - Workshop.pdf
Log4j vulnerability - CCC - Workshop.pdf
 
Log4j vulnerability - CCC - Talk.pdf
Log4j vulnerability - CCC - Talk.pdfLog4j vulnerability - CCC - Talk.pdf
Log4j vulnerability - CCC - Talk.pdf
 
Handling Open-Source Code - ISF 2022.pdf
Handling Open-Source Code - ISF 2022.pdfHandling Open-Source Code - ISF 2022.pdf
Handling Open-Source Code - ISF 2022.pdf
 
CircleCityCon - Threat Hunting with the Elastic Stack
CircleCityCon - Threat Hunting with the Elastic StackCircleCityCon - Threat Hunting with the Elastic Stack
CircleCityCon - Threat Hunting with the Elastic Stack
 
Alamo ACE - Threat Hunting with CVAH
Alamo ACE - Threat Hunting with CVAHAlamo ACE - Threat Hunting with CVAH
Alamo ACE - Threat Hunting with CVAH
 
BSides JAX 2019 - Threat Hunting with the Elastic Stack
BSides JAX 2019 - Threat Hunting with the Elastic StackBSides JAX 2019 - Threat Hunting with the Elastic Stack
BSides JAX 2019 - Threat Hunting with the Elastic Stack
 
How Microsoft will MiTM your network
How Microsoft will MiTM your networkHow Microsoft will MiTM your network
How Microsoft will MiTM your network
 

Dernier

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Dernier (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Level up your SOC - Guide for a Resilient Education Program.pdf

  • 1. Level Up Your SOC: Guide for a Resilient Education Program National Cyber Summit Brandon DeVault Principal Security Author, Pluralsight Defensive Cyber Operations, Air National Guard /in/brandon-devault @SolderSwag www.devaultsecurity.com
  • 2. OUTCOMES! How to assess your team and adversary How to build a sustainable education plan How to upgrade training to meet advanced actor capabilities
  • 4. AGENDA 1. Assessing the Adversary 2. Assessing the Defender 3. Defining Clear Roles 4. Creating the Plan 5. Tackling APTs
  • 7. RISK ANALYSIS Cost vs. Skills Lone Wolf Hackers Hacktivists Organized Crime APT Groups
  • 9. IMPLIED KNOWLEDGE • Do you know what these things are?
  • 12.
  • 13. CYBER CRIME INVESTIGATOR WORK ROLE ID: 221 • “Knowledge of processes for seizing and preserving digital evidence (e.g., chain of custody).” • “Fuse computer network attack analyses with criminal and counterintelligence investigations and operations.” • “Assess the behavior of the individual victim, witness, or suspect as it relates to the investigation.” • “Provide criminal investigative support to trial counsel during the judicial process.”
  • 14. DCWF ROLES Cyber Defense Analyst Cyber Defense Incident Responder Cyber Defense Threat Hunter • Knowledge of the common attack vectors on the network layer. • Skill in performing packet level analysis. • Identify and analyze anomalies in network traffic using metadata. • Knowledge of malware analysis concepts and methodologies. • Skill of identifying, capturing, containing, and reporting malware. • Perform cyber defense trend analysis and reporting. ?
  • 17. Incident Responder SOC Analyst Threat Hunter Red Team Operator Forensic Analyst Security Architect Security Engineer Malware Analyst Exploit Developer Threat Intel Analyst Risk & Governance Manager Compliance Manager IT Auditor Architecture & Engineering Security Operations Governance, Risk & Compliance Penetration Tester Web App Penetration Tester Vulnerability Analyst Pluralsight Security Role Framework
  • 18. Core Skill Incident Response Product/Tool Skills IBM Security QRadar Elastic Security Network Security Monitoring with Suricata Supplemental Skills Python for Cyber Defense Advanced Continuous Learning Breaking News: Vulns, Exploits and Breaches Relevant Certification Preparation Cisco Certified CyberOps Associate CompTIA Cybersecurity Analyst (CySA+) Malware: Prevention, Detection, and Response Network Attacks & Threats with Wireshark Blue Team Tools Incident Responder SOC Analyst Threat Hunter Red Team Operator Forensic Analyst Security Architect Security Engineer Malware Analyst Exploit Developer Threat Intel Analyst Risk & Governance Manager Compliance Manager IT Auditor Architecture & Engineering Security Operations Governance, Risk & Compliance Penetration Tester Web App Penetration Tester Vulnerability Analyst Role-Centric Skill Development
  • 19. Core Skill Incident Response Product/Tool Skills IBM Security QRadar Elastic Security Network Security Monitoring with Suricata Supplemental Skills Python for Cyber Defense Advanced Continuous Learning Breaking News: Vulns, Exploits and Breaches Relevant Certification Preparation Cisco Certified CyberOps Associate CompTIA Cybersecurity Analyst (CySA+) PowerShell for Cyber Defense Network Attacks & Threats with Wireshark Blue Team Tools Incident Responder SOC Analyst Threat Hunter Red Team Operator Forensic Analyst Security Architect Security Engineer Malware Analyst Exploit Developer Threat Intel Analyst Risk & Governance Manager Compliance Manager IT Auditor Architecture & Engineering Security Operations Governance, Risk & Compliance Penetration Tester Web App Penetration Tester Vulnerability Analyst Role-Centric Skill Development
  • 20. Core Skill Incident Response Product/Tool Skills IBM Security QRadar Elastic Security Network Security Monitoring with Suricata Supplemental Skills Python for Cyber Defense Advanced Continuous Learning Breaking News: Vulns, Exploits and Breaches Relevant Certification Preparation Cisco Certified CyberOps Associate CompTIA Cybersecurity Analyst (CySA+) PowerShell for Cyber Defense Network Attacks & Threats with Wireshark Blue Team Tools Incident Responder SOC Analyst Threat Hunter Red Team Operator Forensic Analyst Security Architect Security Engineer Malware Analyst Exploit Developer Threat Intel Analyst Risk & Governance Manager Compliance Manager IT Auditor Architecture & Engineering Security Operations Governance, Risk & Compliance Penetration Tester Web App Penetration Tester Vulnerability Analyst Role-Centric Skill Development
  • 21. Core Skill Incident Response Product/Tool Skills IBM Security QRadar Elastic Security Network Security Monitoring with Suricata Supplemental Skills Python for Cyber Defense Advanced Continuous Learning Breaking News: Vulns, Exploits and Breaches Relevant Certification Preparation Cisco Certified CyberOps Associate CompTIA Cybersecurity Analyst (CySA+) PowerShell for Cyber Defense Network Attacks & Threats with Wireshark Blue Team Tools Incident Responder SOC Analyst Threat Hunter Red Team Operator Forensic Analyst Security Architect Security Engineer Malware Analyst Exploit Developer Threat Intel Analyst Risk & Governance Manager Compliance Manager IT Auditor Architecture & Engineering Security Operations Governance, Risk & Compliance Penetration Tester Web App Penetration Tester Vulnerability Analyst Role-Centric Skill Development
  • 22. Core Skill Incident Response Product/Tool Skills IBM Security QRadar Elastic Security Network Security Monitoring with Suricata Supplemental Skills Python for Cyber Defense Advanced Continuous Learning Breaking News: Vulns, Exploits and Breaches Relevant Certification Preparation Cisco Certified CyberOps Associate CompTIA Cybersecurity Analyst (CySA+) PowerShell for Cyber Defense Network Attacks & Threats with Wireshark Blue Team Tools Incident Responder SOC Analyst Threat Hunter Red Team Operator Forensic Analyst Security Architect Security Engineer Malware Analyst Exploit Developer Threat Intel Analyst Risk & Governance Manager Compliance Manager IT Auditor Architecture & Engineering Security Operations Governance, Risk & Compliance Penetration Tester Web App Penetration Tester Vulnerability Analyst Role-Centric Skill Development
  • 23. Core Skill Incident Response Product/Tool Skills IBM Security QRadar Elastic Security Network Security Monitoring with Suricata Supplemental Skills Python for Cyber Defense Advanced Continuous Learning Breaking News: Vulns, Exploits and Breaches Relevant Certification Preparation Cisco Certified CyberOps Associate CompTIA Cybersecurity Analyst (CySA+) PowerShell for Cyber Defense Network Attacks & Threats with Wireshark Blue Team Tools Incident Responder SOC Analyst Threat Hunter Red Team Operator Forensic Analyst Security Architect Security Engineer Malware Analyst Exploit Developer Threat Intel Analyst Risk & Governance Manager Compliance Manager IT Auditor Architecture & Engineering Security Operations Governance, Risk & Compliance Penetration Tester Web App Penetration Tester Vulnerability Analyst Role-Centric Skill Development
  • 24. Core Skill Incident Response Product/Tool Skills IBM Security QRadar Elastic Security Network Security Monitoring with Suricata Supplemental Skills Python for Cyber Defense Advanced Continuous Learning Breaking News: Vulns, Exploits and Breaches Relevant Certification Preparation Cisco Certified CyberOps Associate CompTIA Cybersecurity Analyst (CySA+) PowerShell for Cyber Defense Network Attacks & Threats with Wireshark Blue Team Tools Incident Responder SOC Analyst Threat Hunter Red Team Operator Forensic Analyst Security Architect Security Engineer Malware Analyst Exploit Developer Threat Intel Analyst Risk & Governance Manager Compliance Manager IT Auditor Architecture & Engineering Security Operations Governance, Risk & Compliance Penetration Tester Web App Penetration Tester Vulnerability Analyst Role-Centric Skill Development
  • 25. Core Skill Incident Response Product/Tool Skills IBM Security QRadar Elastic Security Network Security Monitoring with Suricata Supplemental Skills Python for Cyber Defense Advanced Continuous Learning Breaking News: Vulns, Exploits and Breaches Relevant Certification Preparation Cisco Certified CyberOps Associate CompTIA Cybersecurity Analyst (CySA+) PowerShell for Cyber Defense Network Attacks & Threats with Wireshark Blue Team Tools Incident Responder SOC Analyst Threat Hunter Red Team Operator Forensic Analyst Security Architect Security Engineer Malware Analyst Exploit Developer Threat Intel Analyst Risk & Governance Manager Compliance Manager IT Auditor Architecture & Engineering Security Operations Governance, Risk & Compliance Penetration Tester Web App Penetration Tester Vulnerability Analyst Role-Centric Skill Development
  • 28. THE PLAN (AN APPROACH) Initial Skills Training (IST) • Fundamentals / Theory Initial Qualification Training (IQT) • Using the tools Mission Qualification Training (MQT) • Mission specific (environment) Continuation Training • Research,Workshops, and Conferences
  • 31. REACTIVE VS. PROACTIVE SECURITY Reactive • Security Analytics • Incident Response • Intrusion Detection Systems (IDS) • Anti-virus / Anti-malware Proactive • Threat Hunting • Threat Emulation • Pen-testing
  • 34.
  • 37.
  • 38.
  • 39. QUESTIONS? • www.devaultsecurity.com • linkedin. • twitter. devaultsecurity.com • github. • brandon-devault@pluralsight.com • https://app.pluralsight.com/profile/author/brandon-devault }