<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Security Operations Center in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Security-Operations-Center/m-p/1370#M311</link>
    <description>Folks, do you know, by chance, applicable standards or best practices for building and/or evaluation of Security Operations Centers (SOCs)? thanks everyone in advance!</description>
    <pubDate>Tue, 17 Oct 2017 16:16:22 GMT</pubDate>
    <dc:creator>Azimuth</dc:creator>
    <dc:date>2017-10-17T16:16:22Z</dc:date>
    <item>
      <title>Security Operations Center</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Security-Operations-Center/m-p/1370#M311</link>
      <description>Folks, do you know, by chance, applicable standards or best practices for building and/or evaluation of Security Operations Centers (SOCs)? thanks everyone in advance!</description>
      <pubDate>Tue, 17 Oct 2017 16:16:22 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Security-Operations-Center/m-p/1370#M311</guid>
      <dc:creator>Azimuth</dc:creator>
      <dc:date>2017-10-17T16:16:22Z</dc:date>
    </item>
    <item>
      <title>Re: Security Operations Center</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Security-Operations-Center/m-p/1377#M312</link>
      <description>&lt;P&gt;Alienvault has a publication you can download for free.&amp;nbsp;&lt;/P&gt;&lt;P&gt;"How to Build a Security Operations Center (on a Budget)"&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.alienvault.com/resource-center/ebook/how-to-build-a-security-operations-center" target="_blank"&gt;https://www.alienvault.com/resource-center/ebook/how-to-build-a-security-operations-center&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Its not a bad book to start.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Realize that if do you give them your contact information they will call.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Good Luck,&lt;/P&gt;&lt;P&gt;CEC&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Oct 2017 17:23:08 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Security-Operations-Center/m-p/1377#M312</guid>
      <dc:creator>cec0172</dc:creator>
      <dc:date>2017-10-17T17:23:08Z</dc:date>
    </item>
    <item>
      <title>Re: Security Operations Center</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Security-Operations-Center/m-p/1392#M313</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;SPAN&gt;Azimuth,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I am not sure about any standards, but here are a few resources that should help you get started:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;1. &lt;A href="https://www.sans.org/reading-room/whitepapers/analyst/building-world-class-security-operations-center-roadmap-35907" target="_blank"&gt;SANS Whitepaper "Building a World-Class Security Operations Center: A Roadmap."&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2. Logrythm Whitepaper &lt;A href="https://www.sans.org/reading-room/whitepapers/analyst/building-world-class-security-operations-center-roadmap-35907" target="_blank"&gt;"How to Build a SOC with Limited Resources"&lt;/A&gt;&amp;nbsp;(you will have to provide your contact info to download, but you might find it useful enough. The paper is full of diagram&amp;nbsp;including a "Cost Comparisons of Various SOC Staffing Models" matrix.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;3. For in-depth overview of the subject, here is a&amp;nbsp;200-page book &lt;A href="https://www.amazon.com/Security-Operations-Center-Guidebook-Successful/dp/0128036575" target="_blank"&gt;"Security Operations Center Guidebook: A Practical Guide for a Successful SOC."&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;4. Just found this webinar recording and am updating my comment to include the link: &lt;A href="https://www.infosecurity-magazine.com/webinars/businessdriven-soc/" target="_self"&gt;"How to Run a Business-Driven SOC"&lt;/A&gt; by InfoSecurity Magazine.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I hope this helps. Please let me know if you need any additional help. Good luck!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 21 Oct 2017 15:24:34 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Security-Operations-Center/m-p/1392#M313</guid>
      <dc:creator>azhuk</dc:creator>
      <dc:date>2017-10-21T15:24:34Z</dc:date>
    </item>
    <item>
      <title>Re: Security Operations Center</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Security-Operations-Center/m-p/1415#M314</link>
      <description>&lt;P&gt;In addition to the other wonderful suggestions from our fellow members, there exists an excellent write up on SOCs by MITRE:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.mitre.org/sites/default/files/publications/pr-13-1028-mitre-10-strategies-cyber-ops-center.pdf" target="_blank"&gt;https://www.mitre.org/sites/default/files/publications/pr-13-1028-mitre-10-strategies-cyber-ops-center.pdf&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Oct 2017 19:29:17 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Security-Operations-Center/m-p/1415#M314</guid>
      <dc:creator>Greg</dc:creator>
      <dc:date>2017-10-18T19:29:17Z</dc:date>
    </item>
    <item>
      <title>Re: Security Operations Center</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Security-Operations-Center/m-p/1418#M315</link>
      <description>&lt;P&gt;Thank you Greg for&amp;nbsp;sharing an&amp;nbsp;awesome source of practical wisdom!&lt;/P&gt;</description>
      <pubDate>Wed, 18 Oct 2017 20:41:11 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Security-Operations-Center/m-p/1418#M315</guid>
      <dc:creator>azhuk</dc:creator>
      <dc:date>2017-10-18T20:41:11Z</dc:date>
    </item>
    <item>
      <title>Re: Security Operations Center</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Security-Operations-Center/m-p/4578#M316</link>
      <description>&lt;P&gt;Thank you for sharing some of this material. Would you by any chance have templates or examples of SOC policies and procedures or a runbook that you can share as well? I am more specifically looking for:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Event log Monitoring&lt;/LI&gt;&lt;LI&gt;Notification&lt;/LI&gt;&lt;LI&gt;Incident logging&lt;/LI&gt;&lt;LI&gt;Event Classification and Triage&lt;/LI&gt;&lt;LI&gt;Prioritization and Analysis&lt;/LI&gt;&lt;LI&gt;Remediation and Recovery&lt;/LI&gt;&lt;LI&gt;Assessment and Audit&lt;/LI&gt;&lt;LI&gt;Dashboards and Reporting&lt;/LI&gt;&lt;LI&gt;Incident Investigation&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Tue, 26 Dec 2017 18:17:08 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Security-Operations-Center/m-p/4578#M316</guid>
      <dc:creator>Jackson-munuo</dc:creator>
      <dc:date>2017-12-26T18:17:08Z</dc:date>
    </item>
    <item>
      <title>Re: Security Operations Center</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Security-Operations-Center/m-p/14087#M431</link>
      <description>&lt;P&gt;Nice Article...its very Helpful for the users.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Aug 2018 09:28:55 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Security-Operations-Center/m-p/14087#M431</guid>
      <dc:creator>adubey2321</dc:creator>
      <dc:date>2018-08-29T09:28:55Z</dc:date>
    </item>
    <item>
      <title>Re: Security Operations Center</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Security-Operations-Center/m-p/14138#M432</link>
      <description>A 2018 SANS survey on SOCs provides some interesting data points and metrics &lt;A href="https://www.sans.org/reading-room/whitepapers/analyst/definition-soc-cess-2018-security-operations-center-survey-38570" target="_blank"&gt;https://www.sans.org/reading-room/whitepapers/analyst/definition-soc-cess-2018-security-operations-center-survey-38570&lt;/A&gt;</description>
      <pubDate>Wed, 29 Aug 2018 20:41:41 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Security-Operations-Center/m-p/14138#M432</guid>
      <dc:creator>Markonweb</dc:creator>
      <dc:date>2018-08-29T20:41:41Z</dc:date>
    </item>
    <item>
      <title>Re: Security Operations Center</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Security-Operations-Center/m-p/14827#M473</link>
      <description>&lt;P&gt;In my opinion setting up a SOC isn't something you should take lightly. I'dd love the challenge and experience to set up a SOC for my company but once you have a SOC the time to invest and knowledge to keep up I decided it's best to use a SOC-As-A Service from an experienced specialist.&lt;/P&gt;</description>
      <pubDate>Sun, 23 Sep 2018 13:34:12 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Security-Operations-Center/m-p/14827#M473</guid>
      <dc:creator>Ramon</dc:creator>
      <dc:date>2018-09-23T13:34:12Z</dc:date>
    </item>
    <item>
      <title>Re: Security Operations Center</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Security-Operations-Center/m-p/14828#M474</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/109619831"&gt;@Ramon&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;In my opinion setting up a SOC isn't something you should take lightly. I'dd love the challenge and experience to set up a SOC for my company but once you have a SOC the time to invest and knowledge to keep up I decided it's best to use a SOC-As-A Service from an experienced specialist.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Exactly. In my&amp;nbsp;current organization,&amp;nbsp;after I&amp;nbsp;listed resources&amp;nbsp;required for an in-house SOC, doing&amp;nbsp;a costs-benefits analysis&amp;nbsp;led to us going in for&amp;nbsp;a Managed Security Services provider for the SOC...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 23 Sep 2018 13:45:02 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Security-Operations-Center/m-p/14828#M474</guid>
      <dc:creator>Shannon</dc:creator>
      <dc:date>2018-09-23T13:45:02Z</dc:date>
    </item>
  </channel>
</rss>

