Rabu, 07 April 2010

Security Operations Center: Building, Operating, and Maintaining your SOC,

Security Operations Center: Building, Operating, and Maintaining your SOC, by Joseph Muniz, Gary McIntyre, Nadhem AlFardan

We will certainly reveal you the best as well as simplest way to get publication Security Operations Center: Building, Operating, And Maintaining Your SOC, By Joseph Muniz, Gary McIntyre, Nadhem AlFardan in this world. Bunches of compilations that will certainly assist your duty will be here. It will make you feel so ideal to be part of this web site. Coming to be the member to always see exactly what up-to-date from this publication Security Operations Center: Building, Operating, And Maintaining Your SOC, By Joseph Muniz, Gary McIntyre, Nadhem AlFardan website will certainly make you feel right to look for guides. So, just now, and also here, get this Security Operations Center: Building, Operating, And Maintaining Your SOC, By Joseph Muniz, Gary McIntyre, Nadhem AlFardan to download and save it for your precious worthy.

Security Operations Center: Building, Operating, and Maintaining your SOC, by Joseph Muniz, Gary McIntyre, Nadhem AlFardan

Security Operations Center: Building, Operating, and Maintaining your SOC, by Joseph Muniz, Gary McIntyre, Nadhem AlFardan



Security Operations Center: Building, Operating, and Maintaining your SOC, by Joseph Muniz, Gary McIntyre, Nadhem AlFardan

PDF Ebook Security Operations Center: Building, Operating, and Maintaining your SOC, by Joseph Muniz, Gary McIntyre, Nadhem AlFardan

Security Operations Center

Building, Operating, and Maintaining Your SOC

 

The complete, practical guide to planning, building, and operating an effective Security Operations Center (SOC)

Security Operations Center is the complete guide to building, operating, and managing Security Operations Centers in any environment. Drawing on experience with hundreds of customers ranging from Fortune 500 enterprises to large military organizations, three leading experts thoroughly review each SOC model, including virtual SOCs. You’ll learn how to select the right strategic option for your organization, and then plan and execute the strategy you’ve chosen.

Security Operations Center walks you through every phase required to establish and run an effective SOC, including all significant people, process, and technology capabilities. The authors assess SOC technologies, strategy, infrastructure, governance, planning, implementation, and more. They take a holistic approach considering various commercial and open-source tools found in modern SOCs.

This best-practice guide is written for anybody interested in learning how to develop, manage, or improve a SOC. A background in network security, management, and operations will be helpful but is not required. It is also an indispensable resource for anyone preparing for the Cisco SCYBER exam.

 

·         Review high-level issues, such as vulnerability and risk management, threat intelligence, digital investigation, and data collection/analysis

·         Understand the technical components of a modern SOC

·         Assess the current state of your SOC and identify areas of improvement

·         Plan SOC strategy, mission, functions, and services

·         Design and build out SOC infrastructure, from facilities and networks to systems, storage, and physical security

·         Collect and successfully analyze security data

·         Establish an effective vulnerability management practice

·         Organize incident response teams and measure their performance

·         Define an optimal governance and staffing model

·         Develop a practical SOC handbook that people can actually use

·         Prepare SOC to go live, with comprehensive transition plans

·         React quickly and collaboratively to security incidents

·         Implement best practice security operations, including continuous enhancement and improvement

  

Security Operations Center: Building, Operating, and Maintaining your SOC, by Joseph Muniz, Gary McIntyre, Nadhem AlFardan

  • Amazon Sales Rank: #104937 in Books
  • Published on: 2015-11-08
  • Original language: English
  • Number of items: 1
  • Dimensions: 9.10" h x 1.00" w x 7.30" l, 1.64 pounds
  • Binding: Paperback
  • 448 pages
Security Operations Center: Building, Operating, and Maintaining your SOC, by Joseph Muniz, Gary McIntyre, Nadhem AlFardan

About the Author

Joseph Muniz is a consultant at Cisco Systems and security researcher. Joseph started his career in software development and later managed networks as a contracted technical resource. Joseph moved into consulting and found a passion for security while meeting with a variety of customers. He has been involved with the design and implementation of multiple projects, ranging from Fortune 500 corporations to large federal networks. Joseph is the author of and contributor to several books and is a speaker for popular security conferences. Check out his blog, http://www.thesecurityblogger.com, which showcases the latest security events, research, and technologies.

 

Gary McIntyre is a seasoned information security professional focusing on the development and operation of large-scale information security programs. As an architect, manager, and consultant, he has worked with a wide range of public and private sector organizations around the world to design, build, and maintain small to large security operations teams. He currently holds a Masters degree from the University of Toronto and has also been a long-time (ISC)2 instructor.

 

Dr. Nadhem AlFardan has more than 15 years of experience in the area of information security and holds a Ph.D. in Information Security from Royal Holloway, University of London. Nadhem is a senior security solution architect working for Cisco Systems. Before joining Cisco, he worked for Schlumbeger and HSBC. Nadhem is CISSP certified and is an ISO 27001 lead auditor. He is also CCIE Security certified. In his Ph.D. research, Nadhem published a number of papers in prestige conferences, such as IEEE S&P and USENIX Security, mainly around cryptoanalysis topics. His work involved him working with organizations such as Google, Microsoft, Cisco, Mozilla, OpenSSL, and many others, mainly to help them assess and fix major findings in the Transport Layer Security/Secure Sockets Layer (TLS/SSL) protocol. His work is referenced in a number of IETF standards.


Security Operations Center: Building, Operating, and Maintaining your SOC, by Joseph Muniz, Gary McIntyre, Nadhem AlFardan

Where to Download Security Operations Center: Building, Operating, and Maintaining your SOC, by Joseph Muniz, Gary McIntyre, Nadhem AlFardan

Most helpful customer reviews

2 of 3 people found the following review helpful. This book does an excellent job in many areas By Aamir Lakhani SOCs or security operation centers are difficult to setup, maintain and operate. It is a massive task, and the sum of the entire task is very difficult to articulate. This book does an excellent job in many areas.The book should appeal to professionals and newcomers alike. I would recommend it as required reading for anyone involved in a SOC. Technologies may get updated, techniques may change, but the fundamental principals will stay the same, and this book covers them.Newcomers to the SOC business will learn the challenges of building a SOC, the fundamental steps needed to operate one.Seasoned professionals will pick up new techniques such as threat intelligence and ideas around information sharing which are still extremely new. The book has lots of great diagrams that show the flow of particular sections. Even as technologies get change, or if other products are used instead of the recommended ones, the reader will understand what and why the technology is implemented.The authors did a great job on a very difficult subject.

2 of 3 people found the following review helpful. Both complete and practical By Nick A Kelly "The complete practical guide to planning, building and operating an effective Security Operations Center" sums it up nicely. The key to this read is that it is both complete and practical. Muniz and McIntyre cover all the relevant points, including tactical day to day operations, process and procedure, disaster recovery and business continuity planning, and organization. The guide is peppered with stories that are experienced by CIO's and CISO's every day as we continue to adapt defenses against the changing threat landscape. This handbook is a great resource for professionals in charge of technical organizations, or those tasked with handling risk, governance and compliance. Very valuable for the right price!

5 of 8 people found the following review helpful. An indispensable guide for those designing, managing or deploying a SOC By Ben Rothke Large enterprises have numerous information security challenges. Aside from the external threats; there’s the onslaught of security data from disparate systems, platforms and applications. Getting a handle on the security output from numerous point solutions, generating millions of messages and alerts daily is not a trivial endeavor. As attacks becoming more frequent and sophisticated and with regulatory compliance issues placing an increasing burden, there needs to be a better way to manage all of this.Getting the raw hardware, software and people to create a SOC is not that difficult. The challenge, and it’s a big challenge, is integrating those 3 components to ensure that a formal SOC can operate. In Security Operations Center: Building, Operating, and Maintaining your SOC, authors Joseph Muniz, Gary McIntyre and Nadhem AlFardan have written an indispensable reference on the topic. The authors have significant SOC experience, and provide the reader with a detailed plan on all the steps involved in creating a SOC.As Mike Rothman noted about managed services providers, and something that is relevant to a SOC, you should have no illusions about the amount of effort required to get a SOC up and running, or what it takes to keep one current and useful. Many organizations have neither the time nor the resources to implement a SOC, but do, and are then trapped on the hamster wheel of pain, reacting without sufficient visibility, but without time to invest in gaining that much-needed visibility into threats that the SOC had the potential to provide them with, had they done it right. Those considering deploying a SOC and not wanting to be in the hamster wheel of pain will need this book.The authors have done a great job in covering every phase and the many details required to build out a SOC. After going through the book, some readers will likely reconsider deploying an internal SOC given the difficulties and challenges involved. This is especially true since SOC design and deployment is something not many people have experience with.The book is written for an organization that is serious about building an enterprise SOC. The authors spend much of the book focusing on the myriad requirements for creation of a SOC. They constantly reiterate about details that need to be determined before moving forward.Chapter 4 on SOC strategy is important as the way in which a firm determines their strategy will affect every aspect of the outcome. The authors wisely note that an inadequate or inaccurate SOC strategy, and the ensuing capabilities assessment exercises would produce a SOC strategy that does not properly address the actual requirements of the organization.Ultimately, failing to adequately plan and design is a guarantee for SOC failure. That in turn will affect and impact deployment timelines, budgets and cause frustration, dissatisfaction and friction between the different teams involved in the SOC program.The author’s expertise is evident in every chapter, and their real-world expertise quite obvious in chapter 5 on facilities, which is an area often neglected in SOC design. The significant issue is that if the facility in which the SOC team operates out of does meet certain baseline requirements, the SOC effectiveness will be significantly and often detrimentally impacted. The chapter details many overlooked topics such as: acoustics, lighting, ergonomics, and more.Staffing a SOC is another challenge, and the book dedicates chapter 8 to that. The SOC is only as good as the people inside it, and the SOC staff requires a blend of skills. If the organization wants their SOC to operate 24x7, it will obviously require a lot more manpower of these hard to find SOC analysts.Another helpful aspect is found in chapter 10 which has a number of checklists you can use to verify that all the required pieces are in place prior to a go live data, or be able to identify area that many not be completed as expected.Building a SOC is an arduous process which takes a huge amount of planning and work. This work must be executed by people from different teams and departments, all working together. Based on these challenges, far too many SOC deployments fail. But for anyone who is serious about building out a SOC, this book should be a part of that effort.The reason far too many, perhaps most SOC deployments fail is that firms makes the mistake of obsessing on the hardware and software, without adequately considering the security operations functions. The authors make it eminently clear that such an approach won’t work, and provide you with the expert guidance to obviate that.For anyone considering building a SOC, or wants to understand all of the details involved in building one, Security Operations Center: Building, Operating, and Maintaining your SOC, is an absolute must read.

See all 6 customer reviews... Security Operations Center: Building, Operating, and Maintaining your SOC, by Joseph Muniz, Gary McIntyre, Nadhem AlFardan


Security Operations Center: Building, Operating, and Maintaining your SOC, by Joseph Muniz, Gary McIntyre, Nadhem AlFardan PDF
Security Operations Center: Building, Operating, and Maintaining your SOC, by Joseph Muniz, Gary McIntyre, Nadhem AlFardan iBooks
Security Operations Center: Building, Operating, and Maintaining your SOC, by Joseph Muniz, Gary McIntyre, Nadhem AlFardan ePub
Security Operations Center: Building, Operating, and Maintaining your SOC, by Joseph Muniz, Gary McIntyre, Nadhem AlFardan rtf
Security Operations Center: Building, Operating, and Maintaining your SOC, by Joseph Muniz, Gary McIntyre, Nadhem AlFardan AZW
Security Operations Center: Building, Operating, and Maintaining your SOC, by Joseph Muniz, Gary McIntyre, Nadhem AlFardan Kindle

Security Operations Center: Building, Operating, and Maintaining your SOC, by Joseph Muniz, Gary McIntyre, Nadhem AlFardan

Security Operations Center: Building, Operating, and Maintaining your SOC, by Joseph Muniz, Gary McIntyre, Nadhem AlFardan

Security Operations Center: Building, Operating, and Maintaining your SOC, by Joseph Muniz, Gary McIntyre, Nadhem AlFardan
Security Operations Center: Building, Operating, and Maintaining your SOC, by Joseph Muniz, Gary McIntyre, Nadhem AlFardan

Tidak ada komentar:

Posting Komentar