Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 3 December, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

5 Steps to a High-Speed SOC

by The Gurus
November 1, 2017
in Editor's News
Share on FacebookShare on Twitter

By Rick McElroy, Carbon Black Security Strategist
The threat landscape is evolving. Your endpoints don’t just live within the safety of your corporate network – they’re out in the wild exposed to millions of new threats every day. With non-malware attacks on the rise that are even harder to detect than traditional malware, security professionals are realising it is no longer a matter of if they will be breached, but when.
To harden defences against advanced attacks, security operations centres (SOCs) from every industry have recognised the need for a proactive security posture that arms skilled teams with the people, processes, and technology to rapidly hunt and detect cyber threats. Speed stops breaches, but too many SOCs become beholden to their security stack and get caught up in alerts, reducing triage efficiency and blurring the lines between high-and low-priority threats.
Striking the balance between people, intelligence, and automation can be extremely difficult, and to illustrate the different areas that decision-makers in today’s SOCs need to master to remain agile, we believe there are five essential steps to consider:

  1. Invest in your team

46% of organisations notice a “problematic shortage” of cybersecurity skills and 87% claim it’s difficult to recruit and hire new cybersecurity talent. Building a high-performing security operations centre can be challenging with a scarcity of skilled defenders.
So, it’s essential to assemble and mentor a dynamic team with the right skills to learn more about your environment as it grows.

  1. Build on the basics

Do your people know what your tools are doing? A bigger budget for tools and tactics can definitely help speed up your current processes, but don’t breeze past the basics. 80% of hacking related breaches leveraged either stolen and/or weak passwords. You can focus on proactive and more offensive security once you’re confident in your current deployment, configuration and tuning.

  1. Perfect your process

Don’t wait until after an incident to make sure you have all the data you need. 61% of SOC’s surveyed claim they’re currently centralised into a single SOC. Only 9% are centralising all of the data their tools generate. For a SOC to function efficiently, data about every new process and every file modification should be centralised in one place to maximise visibility and streamline response during an investigation.

  1. Learn from every attack

88% of breaches fell into one of the nine patterns from the three years prior. Sometimes the best threat intel comes from inside your own environment. If threat hunting in a high-powered SOC is finding a needle in a haystack, don’t shovel the same hay twice. When you identify a new attack pattern, harden your defences for the next one.

  1. Embrace the community

Security teams around the globe are expected to wake up in the morning, come to work and stop every single attack. When an attack hits, don’t go it alone. Participating in threat sharing can reduce the average cost of a breach by 8 million pounds.
For a thorough analysis of these and many more crucial elements of a high-speed SOC, download Carbon Black’s free guide on “Building a High-Speed SOC.”

FacebookTweetLinkedIn
Tags: CybersecurityTechnology
ShareTweet
Previous Post

67% of teachers across Britain feel under-equipped to teach coding

Next Post

Synopsys report shows measure of progress in adoption of secure practices in OSS projects

Recent News

Google bins inactive accounts

Google bins inactive accounts

December 1, 2023
Laptop, phone, hands

40% of Cybersecurity Departments Want More Budget to Upskill Employees

November 24, 2023
AI Receives £500 Million Funding in Finance Minister’s 2023 Autumn Statement

AI Receives £500 Million Funding in Finance Minister’s 2023 Autumn Statement

November 24, 2023
Half of Cybersecurity Professionals Kept Awake By Workload Worries

Half of Cybersecurity Professionals Kept Awake By Workload Worries

November 24, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information