+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

Security Operations Center Guidebook

  • ID: 3980564
  • Book
  • 206 Pages
  • Elsevier Science and Technology
1 of 4

Security Operations Center Guidebook: A Practical Guide for a Successful SOC provides everything security professionals need to create and operate a world-class Security Operations Center. It starts by helping professionals build a successful business case using financial, operational, and regulatory requirements to support the creation and operation of an SOC.  It then delves into the policies and procedures necessary to run an effective SOC and explains how to gather the necessary metrics to persuade upper management that a company's SOC is providing value.

This comprehensive text also covers more advanced topics, such as the most common Underwriter Laboratory (UL) listings that can be acquired, how and why they can help a company, and what additional activities and services an SOC can provide to maximize value to a company.

  • Helps security professionals build a successful business case for a Security Operations Center, including information on the necessary financial, operational, and regulatory requirements
  • Includes the required procedures, policies, and metrics to consider
  • Addresses the often opposing objectives between the security department and the rest of the business with regard to security investments
  • Features objectives, case studies, checklists, and samples where applicable

Please Note: This is an On Demand product, delivery may take up to 11 working days after payment has been received.

Note: Product cover images may vary from those shown
2 of 4

Part I
Developing Your Security Operations Center
1. What is a Security Operations Center? 2. Needs Assessment 3. Business Case 4. Building Your SOC 5. Staffing Options

Part II
Operations
6. Responsibilities and Duties 7. Post Orders and Procedures 8. Training Programs 9. Enterprise Access Control 10. Alarm Monitoring 11. Enterprise Video Surveillance 12. Working with Your Vendors 13. Incident Reporting 14. Communication Plan 15. The Emergency Operations Center

Part III
Making the SOC an integral part of your Company
16. Customer Service is KEY 17. Metrics 18. Developing Partnerships 19. Brand Recognition 20. Continuous Improvement

Note: Product cover images may vary from those shown
3 of 4

Loading
LOADING...

4 of 4
Jarpey, Gregory
Gregory Jarpey works for Orbital ATK as the Security Operations Manager for Corporate Security. He has more than 20 years of security experience starting in the United States Army as an Infantryman. Greg has his Bachelor's degree in Business Management and received his PSP (Physical Security Professional) certification from ASIS in 2004. Greg has more than 15 years of experience managing Underwriter Laboratories (UL) certified Security Operation Center as a contractor for Xcel Energy and at Orbital ATK. Greg is a member of and contributor to the ASIS Protection of Assets manuals released in 2012. He hosted a local ASIS chapter meeting in 2010 by conducting a round table about SOC's.
McCoy, Scott
Scott McCoy has more than 30 years of risk management experience starting in the U.S. Army as an explosive ordnance disposal technician. Scott has spent nearly 20 years in corporate security management and received his CPP (Certified Protection Professional certification) from ASIS in 2002. He also received his Certified Information Systems Security Professional (CISSP) and Certified Business Continuity Professional (CBCP) certifications in order to better understand the disciplines of a converged security department, which he formed at Xcel Energy and Alliant Techsystems. He has a Master's degree in Management, and has five years' experience as an adjunct instructor teaching masters level courses in decision making, IT security and security management. He has presented at local and national ASIS conferences on background screening and metrics, and has published magazine articles and white papers on utility specific regulatory issues. In addition, he has contributed several chapters on IT security topics.
Note: Product cover images may vary from those shown
5 of 4
Note: Product cover images may vary from those shown
Order Online - visit: https://www.researchandmarkets.com/reports/3980564
Adroll
adroll