<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Do I need a SOC? in Governance, Risk, Compliance</title>
    <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Do-I-need-a-SOC/m-p/67036#M1078</link>
    <description>&lt;P&gt;A company has recently undergone an exponential growth to 500 employees.&lt;/P&gt;&lt;P&gt;Everyone works from home and uses a cloud based solution for email and documents.&lt;/P&gt;&lt;P&gt;Needless to say, things are in a bit of a mess and need strightening up.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was asked if they needed a SIEM.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This sparked many thoughts, before they employ a SIEM - They need to have things in place otherwise money will be wasted and no real value will be gained.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1, Asset management and Data Classification (inc Supplier assessments)&lt;/P&gt;&lt;P&gt;2, Threat Modelling (prioritisation)&lt;/P&gt;&lt;P&gt;3, Risk Assessments&lt;BR /&gt;&lt;BR /&gt;From there they can look at what they would like to ingest and make use of.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am sure that there are other things to be considered before deciding if a SIEM is appropriate and would appreciate any input.&lt;BR /&gt;&lt;BR /&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 08 Feb 2024 14:05:15 GMT</pubDate>
    <dc:creator>sarlacpit</dc:creator>
    <dc:date>2024-02-08T14:05:15Z</dc:date>
    <item>
      <title>Do I need a SOC?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Do-I-need-a-SOC/m-p/67036#M1078</link>
      <description>&lt;P&gt;A company has recently undergone an exponential growth to 500 employees.&lt;/P&gt;&lt;P&gt;Everyone works from home and uses a cloud based solution for email and documents.&lt;/P&gt;&lt;P&gt;Needless to say, things are in a bit of a mess and need strightening up.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was asked if they needed a SIEM.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This sparked many thoughts, before they employ a SIEM - They need to have things in place otherwise money will be wasted and no real value will be gained.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1, Asset management and Data Classification (inc Supplier assessments)&lt;/P&gt;&lt;P&gt;2, Threat Modelling (prioritisation)&lt;/P&gt;&lt;P&gt;3, Risk Assessments&lt;BR /&gt;&lt;BR /&gt;From there they can look at what they would like to ingest and make use of.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am sure that there are other things to be considered before deciding if a SIEM is appropriate and would appreciate any input.&lt;BR /&gt;&lt;BR /&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Feb 2024 14:05:15 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Do-I-need-a-SOC/m-p/67036#M1078</guid>
      <dc:creator>sarlacpit</dc:creator>
      <dc:date>2024-02-08T14:05:15Z</dc:date>
    </item>
    <item>
      <title>Re: Do I need a SOC?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Do-I-need-a-SOC/m-p/67040#M1079</link>
      <description>Before a SOC, or a SIEM or any other bits and bobs do they have appropriate policies? Particularly with regards to OS, User and application logs? I’d say getting the first cut of a boiler plate policy they can use as a template/guide for their market, vertical, country should be very high priority. They could also write their own but they seem to be deep in the tooling weeds.&lt;BR /&gt;&lt;BR /&gt;I’d agree with your asset register/CMBD as one to start as well, but you might find starting classification, threat modeling and risk as dementia tricky without an appropriate policy framework(also their local privacy and other regulations dictate what you can and can’t collect/do).&lt;BR /&gt;&lt;BR /&gt;Some opinion from me but as a first step I’d get a basic, rough cut security policy first if it’s not there.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 08 Feb 2024 16:42:53 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Do-I-need-a-SOC/m-p/67040#M1079</guid>
      <dc:creator>Early_Adopter</dc:creator>
      <dc:date>2024-02-08T16:42:53Z</dc:date>
    </item>
    <item>
      <title>Re: Do I need a SOC?</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Do-I-need-a-SOC/m-p/67057#M1080</link>
      <description>&lt;P&gt;Thanks, that's really good point.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Feb 2024 20:14:08 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Do-I-need-a-SOC/m-p/67057#M1080</guid>
      <dc:creator>sarlacpit</dc:creator>
      <dc:date>2024-02-08T20:14:08Z</dc:date>
    </item>
  </channel>
</rss>

