Security Operations Center
Building, Operating, and Maintaining Your SOC
The complete, practical guide to planning, building, and operating an effective Security Operations Center (SOC)
Security Operations Center is the complete guide to building, operating, and managing Security Operations Centers in any environment. Drawing on experience with hundreds of customers ranging from Fortune 500 enterprises to large military organizations, three leading experts thoroughly review each SOC model, including virtual SOCs. You’ll learn how to select the right strategic option for your organization, and then plan and execute the strategy you’ve chosen.
Security Operations Center walks you through every phase required to establish and run an effective SOC, including all significant people, process, and technology capabilities. The authors assess SOC technologies, strategy, infrastructure, governance, planning, implementation, and more. They take a holistic approach considering various commercial and open-source tools found in modern SOCs.
This best-practice guide is written for anybody interested in learning how to develop, manage, or improve a SOC. A background in network security, management, and operations will be helpful but is not required. It is also an indispensable resource for anyone preparing for the Cisco SCYBER exam.
· Review high-level issues, such as vulnerability and risk management, threat intelligence, digital investigation, and data collection/analysis
· Understand the technical components of a modern SOC
· Assess the current state of your SOC and identify areas of improvement
· Plan SOC strategy, mission, functions, and services
· Design and build out SOC infrastructure, from facilities and networks to systems, storage, and physical security
· Collect and successfully analyze security data
· Establish an effective vulnerability management practice
· Organize incident response teams and measure their performance
· Define an optimal governance and staffing model
· Develop a practical SOC handbook that people can actually use
· Prepare SOC to go live, with comprehensive transition plans
· React quickly and collaboratively to security incidents
· Implement best practice security operations, including continuous enhancement and improvement
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Joseph Muniz is a consultant at Cisco Systems and security researcher. Joseph started his career in software development and later managed networks as a contracted technical resource. Joseph moved into consulting and found a passion for security while meeting with a variety of customers. He has been involved with the design and implementation of multiple projects, ranging from Fortune 500 corporations to large federal networks. Joseph is the author of and contributor to several books and is a speaker for popular security conferences. Check out his blog, http://www.thesecurityblogger.com, which showcases the latest security events, research, and technologies.
Gary McIntyre is a seasoned information security professional focusing on the development and operation of large-scale information security programs. As an architect, manager, and consultant, he has worked with a wide range of public and private sector organizations around the world to design, build, and maintain small to large security operations teams. He currently holds a Masters degree from the University of Toronto and has also been a long-time (ISC)2 instructor.
Dr. Nadhem AlFardan has more than 15 years of experience in the area of information security and holds a Ph.D. in Information Security from Royal Holloway, University of London. Nadhem is a senior security solution architect working for Cisco Systems. Before joining Cisco, he worked for Schlumbeger and HSBC. Nadhem is CISSP certified and is an ISO 27001 lead auditor. He is also CCIE Security certified. In his Ph.D. research, Nadhem published a number of papers in prestige conferences, such as IEEE S&P and USENIX Security, mainly around cryptoanalysis topics. His work involved him working with organizations such as Google, Microsoft, Cisco, Mozilla, OpenSSL, and many others, mainly to help them assess and fix major findings in the Transport Layer Security/Secure Sockets Layer (TLS/SSL) protocol. His work is referenced in a number of IETF standards.
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
EUR 10,82 per la spedizione da U.S.A. a Italia
Destinazione, tempi e costiEUR 8,29 per la spedizione da Regno Unito a Italia
Destinazione, tempi e costiDa: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Paperback. Condizione: Very Good. No Jacket. Former library book; May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.65. Codice articolo G0134052013I4N10
Quantità: 1 disponibili
Da: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Paperback. Condizione: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.65. Codice articolo G0134052013I4N00
Quantità: 1 disponibili
Da: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Paperback. Condizione: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.65. Codice articolo G0134052013I4N00
Quantità: 1 disponibili
Da: Speedyhen, London, Regno Unito
Condizione: NEW. Codice articolo NW9780134052014
Quantità: 3 disponibili
Da: PBShop.store UK, Fairford, GLOS, Regno Unito
PAP. Condizione: New. New Book. Shipped from UK. Established seller since 2000. Codice articolo GB-9780134052014
Quantità: 3 disponibili
Da: Kennys Bookshop and Art Galleries Ltd., Galway, GY, Irlanda
Condizione: New. . 2015. 1st Edition. Paperback. . . . . Codice articolo V9780134052014
Quantità: 3 disponibili
Da: GreatBookPricesUK, Woodford Green, Regno Unito
Condizione: New. Codice articolo 22267610-n
Quantità: 1 disponibili
Da: Ria Christie Collections, Uxbridge, Regno Unito
Condizione: New. In. Codice articolo ria9780134052014_new
Quantità: 3 disponibili
Da: moluna, Greven, Germania
Condizione: New. This is the first complete guide to building, operating, managing, and operating Security Operations Centers in any business or organizational environment. Two leading IT security experts review the characteristics, strengths, and weaknesses of each SOC . Codice articolo 35210912
Quantità: 3 disponibili
Da: Majestic Books, Hounslow, Regno Unito
Condizione: New. Codice articolo 311919487
Quantità: 3 disponibili