Mastering a Security Operations Center (SOC)

$17.00
Compare

amazon paymentsamerican expressapple paybitcoindankortdiners clubdiscoverdogecoindwollaforbrugsforeningeninteracgoogle payjcbklarnaklarna-pay-laterlitecoinmaestromasterpaypalshopify paysofortvisa
SKU:
Availability : In Stock Pre order Out of stock
Description

In the digital age, cybersecurity is not just a necessity, but a paramount responsibility. With an ever-evolving landscape of threats, setting up and managing a Security Operations Center (SOC) has become an integral part of maintaining the security posture of organizations.

Kris Hermans is a veteran in the field of cybersecurity, with over two decades of experience. Renowned for his pragmatic and clear approach to complex security concepts. With decades of experience in setting up and managing SOCs around the globe for large multinational corporations and government agencies alike, Kris shares his wealth of knowledge in this comprehensive guide.

In this book, you will:

  • Understand the fundamentals of a SOC and its vital role in an organization.
  • Learn the steps to plan, set up, and equip your SOC.
  • Discover effective strategies for recruiting and training a competent security team.
  • Gain insights into managing the day-to-day operations of a SOC.
  • Explore advanced concepts like threat intelligence, incident response, and continuous improvement for your SOC.
  • Learn to prepare for and pass any SOC audit.
  • Learn how to improve the SOC performance and function.

Whether you're a novice security professional or a seasoned IT manager, this book provides a roadmap to navigate the challenges and triumphs of setting up and managing a SOC.

What's Inside:

  1. Introduction
    1. Steps for Hiring a SOC
      1. Hiring challenges
      2. Finding the right talent
      3. Frequent turnover
      4. Creating your hiring strategy
      5. Justifying your hiring budget
      6. Security operations organizational chart
      7. Types of staffing models
        1. In house
        2. Hybrid
        3. Outsourced
      8. Building your SOC team
        1. Chief Information Security Officer (CISO)
        2. SOC Manager
        3. Security engineer
        4. Incident responder
        5. Security analyst
        6. Retaining your security team
      9. Hire the right people
      10. Optimize your job listings
  2. Evolution of the SOC function
  3. Define the scope and objectives
  4. Assess current security posture
  5. Develop a security strategy
  6. Build the team
  7. Implement security tools and technologies
  8. Establish security processes
  9. Launch and monitor the SOC
  10. SOC tools (SIEM and SOAR)
    1. Choosing the right SIEM (security information and event management)
    2. Choosing the right SOAR (Security Orchestration, Automation and Response)
  11. How to perform a SOC audit
  12. Assessing Real-Time Threat Monitoring Capabilities
  13. Compliance Management
  14. Policy Integrity
  15. SIEM Calibration and Maintenance
  16. Incident Response Planning (IRP)
  17. Perimeter Defense Responsiveness
  18. Recovery Capabilities
  19. Threat Readiness Exercises
  20. Conclusion

Buy Now: Available in Hardcover, Paperback, and eBook formats.