About Rafeeq Rehman
Consultant, Author, Researcher.
Following is the list of reference material for my presentation on connected vehicles to the ISSA Infosec Summit on May 23rd. McKinsey & Company – Shifting gears in cyber security for connected vehicles NXP: Automotive Gateway: A Key Component to Securing the Connected … Continue reading →
Like this:
Like Loading...
While there could be many definitions of what a connected vehicle is, following is how Wikipedia defines a “connected car”. “A connected caris a carthat is equipped with Internet access, and usually also with a wireless local area network. This allows the carto … Continue reading →
Like this:
Like Loading...
Budget estimates are a major part of building SOC business case. A typical budget will consist of the following three major components: Capital Cost– This consists of initial expense of building SOC and includes everything from furniture to hardware, software … Continue reading →
View post to subscribe to site newsletter.
Like this:
Like Loading...
Logs provide a wealth of information and that is one of the reasons that almost all security standards and frameworks (NIST, ISO, PCI, and others) emphasize on collection, storage, and analysis of log data as one of the key aspects … Continue reading →
Like this:
Like Loading...
Continuous learning and skills development is an essential part of any Cybersecurity professional but they don’t get enough time during normal work week. So why not turn Saturdays into a collaborative learning events where people come to share knowledge, teach, … Continue reading →
Like this:
Like Loading...
While doing research on my upcoming book about running a successful Security Operations Center (SOC), I have interviewed people who have built and run SOC as well as survey reports from organizations like SANS and others. Overall it is a … Continue reading →
Like this:
Like Loading...
Posted in SOC
|
Tagged SOC
|
While defining SOC mission and goals are key starting points, defining SOC scope is crucial to manage the overall SOC project and break a large multi-year project into smaller phases and milestones. This also helps in managing cost and simplify … Continue reading →
Like this:
Like Loading...
Posted in SOC
|
Tagged SOC
|
Like last year, ransomware continues to be a major issue for many organizations. One of the best things any organization can do to itself is to prepare for dealing with ransomware incidents. While ransomware is morphing into crypto currency mining … Continue reading →
Like this:
Like Loading...
SOC Planning – Defining SOC Scope Defining scope for the SOC is crucial for its success and to determine stakeholders for the SOC. The scope will help determine cost, associates needed to run the SOC, SOC processes and many other … Continue reading →
Like this:
Like Loading...
Data-driven business innovation is not something of distant future anymore. It is a reality of today. Many businesses are already reaping benefits of monetizing internal data that they already possess. Some are taking data-driven business innovation to the next levels … Continue reading →
Like this:
Like Loading...