Login

Register

Login

Register


At RSA Conference in San Francisco, RSA’s Ankush Baveja made a case for a SOC effectiveness framework

SOC effectiveness is hard to measure without a valid framework, argued RSA’s presales engineer, Ankush Baveja. “Senior executives and senior leadership teams don’t get to see the results of what the SOC team is doing.” The solution, he argued, is simple: Create a framework to showcase a SOC’s maturity.

“You need to identify the SOC capability and link that to metrics. The metrics then have to link to the outcome,” explained Bajev. “Set your objective and within those you can have multiple goals. Further, develop questions around each goal to help you to identify the current state of that goal.” Your metrics must be something that is actionable, he added.

“Link your business objectives to the goals you are trying to achieve,” continued Baveja, who listed operations, engineering and IT and the blue and red team as the ‘SOC Capability Triad’.

RSA’s Baveja set out the following six-month plan for choosing and auctioning a SOC metrics framework:

  1. First, choose a framework and download and use the framework sheet
  2. Define capabilities for your SOC – both current and a roadmap
  3. Identify metrics for each capability and use the GQIM methodology
  4. Define how these measurements affect your decisions
  5. Define stakeholders and assign ownership to monitor/alert
  6. Create your SOC Dashboard
  7. Set periodic checkpoints to review the goals
  8. If “A” metric doesn’t add value or lead to a decision, dump it

Finally, Bajeva echoed the opening remarks of Rohit Ghai by warning information security professionals against focusing on the most catastrophic threats, and instead prioritizing the most likely threats. “Look at the most likely threats to your organization and build your content around that,” he concluded.

____________________________________________________________________________________________________________________

#infosec #itsecurity #hacking #hacker #computerhacker #blackhat #ceh #ransomeware #maleware #ncs #nationalcybersecurityuniversity #defcon #ceh #cissp #computers #cybercrime #cybercrimes #technology #jobs #itjobs #gregorydevans #ncs #ncsv #certifiedcybercrimeconsultant #privateinvestigators #hackerspace #nationalcybersecurityawarenessmonth #hak5 #nsa #computersecurity #deepweb #nsa #cia #internationalcybersecurity #internationalcybersecurityconference #iossecurity #androidsecurity #macsecurity #windowssecurity
____________________________________________________________________________________________________________________

Source link

Leave a Reply

Shqip Shqip አማርኛ አማርኛ العربية العربية English English Français Français Deutsch Deutsch Português Português Русский Русский Español Español

National Cyber Security Consulting App

 https://apps.apple.com/us/app/id1521390354

https://play.google.com/store/apps/details?id=nationalcybersecuritycom.wpapp


NATIONAL CYBER SECURITY RADIO
[spreaker type=player resource="show_id=4560538" width="100%" height="550px" theme="light" playlist="show" playlist-continuous="true" autoplay="false" live-autoplay="false" chapters-image="true" episode-image-position="left" hide-logo="false" hide-likes="false" hide-comments="false" hide-sharing="false" hide-download="true"]
HACKER FOR HIRE MURDERS
 [spreaker type=player resource="show_id=4569966" width="100%" height="350px" theme="light" playlist="show" playlist-continuous="true" autoplay="false" live-autoplay="false" chapters-image="true" episode-image-position="left" hide-logo="false" hide-likes="false" hide-comments="false" hide-sharing="false" hide-download="true"]

ALEXA “OPEN NATIONAL CYBER SECURITY RADIO”

National Cyber Security Radio (Podcast) is now available for Alexa.  If you don't have an Alexa device, you can download the Alexa App for free for Google and Apple devices.   

nationalcybersecurity.com

FREE
VIEW