This is the definitive, vendor-neutral guide to building, maintaining, and operating a modern Security Operations Center (SOC). The authors introduce the SOC as a service provider, and show how to use your SOC to integrate and transform existing security practices, making them far more effective. This book covers: How SOCs have evolved, and the key considerations in deploying them today Key services SOCs can deliver, including organizational risk management, threat modeling, vulnerability assessment, incident response, ...
Read More
This is the definitive, vendor-neutral guide to building, maintaining, and operating a modern Security Operations Center (SOC). The authors introduce the SOC as a service provider, and show how to use your SOC to integrate and transform existing security practices, making them far more effective. This book covers: How SOCs have evolved, and the key considerations in deploying them today Key services SOCs can deliver, including organizational risk management, threat modeling, vulnerability assessment, incident response, investigation, forensics, and compliance People and process issues, including training, career development, job rotation, and hiring Centralizing and managing security data more effectively Threat intelligence and threat hunting Incident response, recovery, and vulnerability management Using data orchestration and playbooks to automate and control the response to any situation Advanced tools, including SIEM 2.0 The future of SOCs, including AI-Assisted SOCs, machine learning, and training models
Read Less