Category Archives: SOC

Book: Cybersecurity Arm Wrestling – Chapters 1-3

Winning the perpetual fight against crime by building a modern Security Operations Center I am happy to announce that first three chapters of my book “Cybersecurity Arm Wrestling: Winning the perpetual fight against crime by building a modern Security Operations … Continue reading

Posted in SOC | Tagged , , | Comments Off on Book: Cybersecurity Arm Wrestling – Chapters 1-3

SOC Book: Chapter 1 Available for Download

Just published first chapter draft of the my latest book: “CyberSecurity Arm Wrestling: Winning the perpetual fight against crime by building a modernSecurity Operations Center“. This chapter is available for immediate download by clicking here. The chapter covers the following … Continue reading

Posted in InfoSec, SOC | Tagged , | Comments Off on SOC Book: Chapter 1 Available for Download

Scalable Log Collection as Foundation of SOC

Logs provide a wealth of information and that is one of the reasons that almost all security standards and frameworks (NIST, ISO, PCI, and others) emphasize on collection, storage, and analysis of log data as one of the key aspects … Continue reading

Posted in InfoSec, SOC | Tagged , , , | Comments Off on Scalable Log Collection as Foundation of SOC

CISO MindMap 2018 – What Do InfoSec Professionals Really Do?

Like last year, ransomware continues to be a major issue for many organizations. One of the best things any organization can do to itself is to prepare for dealing with ransomware incidents. While ransomware is morphing into crypto currency mining … Continue reading

Posted in InfoSec, Leadership, SOC | Tagged , , , , , | Comments Off on CISO MindMap 2018 – What Do InfoSec Professionals Really Do?

Building a Successful Security Operations Center (SOC): Part 4

SOC Planning – Defining SOC Scope Defining scope for the SOC is crucial for its success and to determine stakeholders for the SOC. The scope will help determine cost, associates needed to run the SOC, SOC processes and many other … Continue reading

Posted in InfoSec, SOC | Tagged , , , , , , | Comments Off on Building a Successful Security Operations Center (SOC): Part 4