Designing and Building Security Operations Center

  • ID: 2899382
  • Book
  • 276 Pages
  • Elsevier Science and Technology
1 of 4
Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact? How can you gather intelligence that will allow you to configure your system to ward off attacks? Online security and privacy issues are becoming more and more significant every day, with many instances of companies and governments mishandling (or deliberately misusing) personal and financial data.

Organizations need to be committed to defending their own assets and their customers' information. Designing and Building a Security Operations Center will show you how to develop the organization, infrastructure, and capabilities to protect your company and your customers effectively, efficiently, and discreetly.

Written by a subject expert who has consulted on SOC implementation in both the public and private sector, Designing and Building a Security Operations Center is the go-to blueprint for cyber-defense.

- Explains how to develop and build a Security Operations Center- Shows how to gather invaluable intelligence to protect your organization- Helps you evaluate the pros and cons behind each decision during the SOC-building process

Please Note: This is an On Demand product, delivery may take up to 11 working days after payment has been received.
Note: Product cover images may vary from those shown
2 of 4
  1. Define an operations center
  2. Identify the customers
  3. Required Infrastructure
  4. Organizational Structure
  5. Staffing
  6. Daily operations
  7. Training
  8. Metrics
  9. Outsourcing
  10. Summary
Note: Product cover images may vary from those shown
3 of 4

Loading
LOADING...

4 of 4
Nathans, David
David Nathans is a highly-sought-after consultant on building enterprise security programs, Security Operation Centers and as a speaker on cyber security for conferences, interest groups, and corporate events. As a former CISO for a large US and Italian defense contractor as well as the former Global Security Operations Center manager for one of the largest Managed Security Services Providers in the world, he has a wealth of security operations knowledge he now shares. The experiences and lessons learned also stem from his time building security programs at one of the largest breached retail companies in history as well as working all over the world as a cyber-operations officer for the U.S. Air Force. He has also written and continues to write articles for SC Magazine
Note: Product cover images may vary from those shown
5 of 4
Note: Product cover images may vary from those shown
Adroll
adroll