How To Build a Powerful Security Operations Center, Part 3: Financial Investment & Reporting

If you’ve made it this far through the series, you’re no doubt starting to realize (if you hadn’t already) that building a functional SOC requires a great deal of time, thought, and investment. If you haven’t been following the series so far, now would be a good time to go back and read the first two articles: Part 1: Motivation & Logistics Part 2: Technical Requirements So now that we've covered the most important components of a powerful SOC, it’s time to bring things into the real world, and talk about financial investment.
Read more

How To Build a Powerful Security Operations Center, Part 2: Technical Requirements

In the last post, we took a look at the logistical and human issues surrounding the setup of a new security operations center (SOC). And while having a mission, the right people, and a physically secure location are all vital to the success of a new SOC, there are many more things to consider before you can jump in and get started. In this post, we’re going to take a closer look at the technical requirements of building a SOC, including software, hardware, communications, project tracking, and more. So let’s get right to it…
Read more

How To Build a Powerful Security Operations Center, Part 1: Motivation & Logistics

There’s a certain mystique and excitement surrounding the idea of a security operations center. It puts your in mind of a mission control style room, possibly in an underground bunker, where people in uniforms shout orders and spend all their time responding to imminent threats. And in a world where cyber attacks have become a daily reality, and even midsize organizations are forced to designate substantial budgets for cyber security, the idea of implementing a SOC has become far more realistic.
Read more