<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: When Building a SOC.... in Threats</title>
    <link>https://community.isc2.org/t5/Threats/When-Building-a-SOC/m-p/47973#M401</link>
    <description>&lt;P&gt;In a word: no.&lt;BR /&gt;Of course you will need people to look at the event streams and make sense of them. This is true regardless of the amount of automation you build into the SIEM/SOAR system. You should also look at EDR/XDR solutions. SIEM tends to be a lagging indicator. EDR can potentially stop things before they create an incident. This is a really loaded question.&lt;/P&gt;</description>
    <pubDate>Tue, 19 Oct 2021 14:53:57 GMT</pubDate>
    <dc:creator>peek</dc:creator>
    <dc:date>2021-10-19T14:53:57Z</dc:date>
    <item>
      <title>When Building a SOC....</title>
      <link>https://community.isc2.org/t5/Threats/When-Building-a-SOC/m-p/47953#M396</link>
      <description>&lt;P&gt;When building a Security Operations Center (SOC), is a SIEM enough?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Oct 2021 20:22:30 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/When-Building-a-SOC/m-p/47953#M396</guid>
      <dc:creator>bjames</dc:creator>
      <dc:date>2021-10-18T20:22:30Z</dc:date>
    </item>
    <item>
      <title>Re: When Building a SOC....</title>
      <link>https://community.isc2.org/t5/Threats/When-Building-a-SOC/m-p/47962#M398</link>
      <description>&lt;P&gt;Enough what?&lt;/P&gt;</description>
      <pubDate>Tue, 19 Oct 2021 03:10:25 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/When-Building-a-SOC/m-p/47962#M398</guid>
      <dc:creator>bkwalker</dc:creator>
      <dc:date>2021-10-19T03:10:25Z</dc:date>
    </item>
    <item>
      <title>Re: When Building a SOC....</title>
      <link>https://community.isc2.org/t5/Threats/When-Building-a-SOC/m-p/47972#M400</link>
      <description>&lt;P&gt;Is this a philosophical question?&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.mitre.org/sites/default/files/publications/pr-13-1028-mitre-10-strategies-cyber-ops-center.pdf" target="_blank" rel="noopener"&gt;MITRE: Ten Strategies of a World-Class Cybersecurity Operations Center&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Oct 2021 14:31:38 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/When-Building-a-SOC/m-p/47972#M400</guid>
      <dc:creator>tmekelburg1</dc:creator>
      <dc:date>2021-10-19T14:31:38Z</dc:date>
    </item>
    <item>
      <title>Re: When Building a SOC....</title>
      <link>https://community.isc2.org/t5/Threats/When-Building-a-SOC/m-p/47973#M401</link>
      <description>&lt;P&gt;In a word: no.&lt;BR /&gt;Of course you will need people to look at the event streams and make sense of them. This is true regardless of the amount of automation you build into the SIEM/SOAR system. You should also look at EDR/XDR solutions. SIEM tends to be a lagging indicator. EDR can potentially stop things before they create an incident. This is a really loaded question.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Oct 2021 14:53:57 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/When-Building-a-SOC/m-p/47973#M401</guid>
      <dc:creator>peek</dc:creator>
      <dc:date>2021-10-19T14:53:57Z</dc:date>
    </item>
    <item>
      <title>Re: When Building a SOC....</title>
      <link>https://community.isc2.org/t5/Threats/When-Building-a-SOC/m-p/47993#M403</link>
      <description>&lt;P&gt;It's a good start, but you will also need security analysts, automation, processes to follow, etc.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Oct 2021 14:12:41 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/When-Building-a-SOC/m-p/47993#M403</guid>
      <dc:creator>mstoyanoff</dc:creator>
      <dc:date>2021-10-20T14:12:41Z</dc:date>
    </item>
    <item>
      <title>Re: When Building a SOC....</title>
      <link>https://community.isc2.org/t5/Threats/When-Building-a-SOC/m-p/48028#M409</link>
      <description>&lt;P&gt;This is a somewhat&amp;nbsp; strange question in my opinion. It depends!. If your SIEM covers every possible threat vector for your organization then I guess it would be ok. In real life, it's highly unlikely that this would be the case though. You would probably need elements of SOAR, EDR etc too.&amp;nbsp; I might be wrong.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 23 Oct 2021 22:43:29 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/When-Building-a-SOC/m-p/48028#M409</guid>
      <dc:creator>Hari</dc:creator>
      <dc:date>2021-10-23T22:43:29Z</dc:date>
    </item>
    <item>
      <title>Re: When Building a SOC....</title>
      <link>https://community.isc2.org/t5/Threats/When-Building-a-SOC/m-p/48114#M410</link>
      <description>&lt;P&gt;In one word, nope! A SIEM is a robust tool to fetch logs and correlate, analyze uses the build in AI to show you its calculated output. However, first thing while you procure a SIEM, understand your business, identify your threat landscape. You are going to need many use cases catered for your organization. While building the use cases, you might come up with the need to many tools, whose logs are needed in the SIEM to make it something useful.&lt;/P&gt;</description>
      <pubDate>Sat, 30 Oct 2021 15:18:53 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/When-Building-a-SOC/m-p/48114#M410</guid>
      <dc:creator>curious_mind</dc:creator>
      <dc:date>2021-10-30T15:18:53Z</dc:date>
    </item>
    <item>
      <title>Re: When Building a SOC....</title>
      <link>https://community.isc2.org/t5/Threats/When-Building-a-SOC/m-p/48520#M422</link>
      <description>&lt;P&gt;Short answer would be no. SIEM is a great start, but not enough. For a more mature SOC you would want to incorporate more tools and data sources to enhance detection and analytic capabilities.&lt;/P&gt;</description>
      <pubDate>Sun, 05 Dec 2021 04:51:51 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/When-Building-a-SOC/m-p/48520#M422</guid>
      <dc:creator>sergeling</dc:creator>
      <dc:date>2021-12-05T04:51:51Z</dc:date>
    </item>
  </channel>
</rss>

