Next generation cyber SOC

By K K Mookhey , Mathan Babu Kasilingam , Hidayath Khan , Shivkumar Pandey , Michael Smith on 03 Mar 2018 @ Nullcon
πŸ“Ή Video πŸ”— Link
#security-analytics #security-monitoring #cloud-workload-protection #threat-modeling #zero-trust #automated-triaging #alert-fatigue
Focus Areas: πŸ›‘οΈ Security Operations & Defense , ☁️ Cloud Security , πŸ—οΈ Security Architecture

Presentation Material

AI Generated Summary

Here is a summary of the discussion:

Key Points:

  1. Technology overload: There are too many security technologies, tools, which can be overwhelming.
  2. Knowing your asset landscape: It’s essential to understand your technology landscape and know what assets you need to protect.
  3. Quick detection and response: The heart of security operations is quickly detecting and responding to threats.
  4. Measuring effectiveness: We don’t measure the effectiveness of our security operations well enough.
  5. Technology is not the biggest deal: Choosing the right technology is not the most critical factor in security success; leveraging only 30% of its capabilities is a common issue.
  6. Defining business objectives: When setting up a Security Operations Center (SOC), it’s crucial to articulate what you want to achieve from a business perspective.
  7. Red team and blue team exercises: Conducting these exercises helps ensure the SOC can detect threats when they’re not obvious.
  8. People are the biggest challenge: Cross-training people from different domains, reskilling them for security, and giving them new challenges is vital in the talent war.
  9. Recruiters play a significant role: Recruiters often sponsor events and poach top security talent, making it essential to build good relationships with them.

Other points:

  • Zero-day attacks are often a marketing term used by vendors to sell their products.
  • Red Team assessments often don’t require zero-day exploits; instead, they focus on simple issues like weak passwords.
  • The security industry is prone to buzzwords and marketing terms, which can be distracting.
Disclaimer: This summary was auto-generated from the video transcript using AI and may contain inaccuracies. It is intended as a quick overview β€” always refer to the original talk for authoritative content. Learn more about our AI experiments.