SlideShare a Scribd company logo
Security Operations Cloud vs On Prem
SOC for Cloud Native Companies
Vikas Yadav
Little bit about Myself
Current
Current: CISO at Nykaa
Prior
CISO Max Life
MTech IIT Kharagpur, CISSP, CCSK
Military Veteran
Outside Work
Sports - Tennis, Golf, Trekking
Reading
Online Courses
Love Travelling
Agenda
1. Need for a SOC
2. What is a SOC
3. Security Operations - Cyber Hygiene
4. SOC Essential Components
5. SOC Maturity
6. Modern SOC
7. SOC for Cloud Environments
Need for SOC !
● Security Roadmap Item No 3 - Our Consultant told us.
● FOMO - Everyone has it.
● Tick in the Box - Regulatory Requirement.
○ CERT-IN / GDPR mandates 72 hr reporting
● Prevention is not Enough ! - Incident Detection and Response - Help
respond and recover faster.
What are your trying to solve ?
● Business Problems
○ Fraud
○ Data Leakage
○ Ransomware
● Technical Challenges/ Security Gaps
○ Need to detect cyber attacks timely
○ Correlate alerts coming from different sources
● Process Issues
○ Too many disparate security solutions
○ No coordinate way to detect and prevent attacks
Security Operations vs Log Aggregation
1. Do you Monitors events and logs ?
2. Correlate and add context to detect a breach/attack ?
3. Performs investigations to understand root cause and mitigate impact ?
4. Coordinate with IT/ DevOps to to address the breach ?
5. Seek external help - Incident Response firm ?
6. Inform Senior management.
7. Take Remedial Action and document Lessons Learned ?
What is SOC ?
A SOC is a team primarily composed of security analysts organized to detect,
analyze, respond to, report on, and prevent cybersecurity incidents.
A SOC is traditionally a physical facility within an organization, which houses an
information security team. This team analyzes and monitors the organization’s
security systems. The SOC’s mission is to protect the company from security
breaches by identifying, analyzing, and reacting to cybersecurity threats.
A security operations center (SOC) can be defined both as a team, often operating in
shifts around the clock, and a facility dedicated to and organized to prevent, detect,
assess and respond to cybersecurity threats and incidents, and to fulfill and
assess regulatory compliance.
SOC Maturity Curve
Essential components of a SOC
SNo Component Purpose Sample Gaps
1 PEOPLE - SOC Staff To monitor alerts , To triage , To
respond, To recover
NOT TO RAISE A TICKET
No Designated Person or Structure
2 SOC PROCESSES Should be simple and effective
Playbooks should be defined
No Processes defined
No one to look at alerts
No ticketing systems
3 TECH Stack AV/ EDR, SWG, Firewalls
SIEM - Logging and Correlation
SOAR - Automation
Inadequate Logging
Not centralised
4 Data Sources Logs
Central Solution - SIEM or Log
Management Solution
No SIEM
Automation
5 Threat Intel IOCs
Intelligence Feeds
No Threat Intel
No Intelligence Feeds
6 Use Cases Detect and Prevent Attacks Use Cases Relevant
SOC Maturity Model
Source: Gorka Sadowski Medium Article - New-soc-maturity-model-based-on-outcomes
Modern SOC - Outcome Based
Source: Gorka Sadowski Medium Article - New-soc-maturity-model-based-on-outcomes
Security Operations in Cloud
SOC for Cloud environments
How things change in Cloud ?
1. People
a. Conventional SOC analysts do not understand Cloud
b. Need people with new Skill Sets
2. Technology
a. Threat Model changes - You do not own Infra.
b. Multi Cloud environment and SAAS applications
c. Log Volume increases exponentially ( Web systems)
d. Egress Costs
e. Uncommon Log Collection methods
3. Processes
a. Easier to automate
b. Conventional slow processes may not work with DevOps team
4. Advantages
a. Lot of controls out of the box - Native Security Controls
b. AWS Guard Duty, Detective
Suggested strategies
1. Prioritise Visibility
2. Leverage new Tools
a. CASB - Cloud Access Security Broker
b. CSPM Cloud Security Posture Managements
3. Leverage Native Controls
a. AI ML - AWS Guard Duty/ AWS Detective
4. Prefer Cloud and Native SIEMs( Egress Cost !)
a. Google Chronicle/SUMO Logic/Elastic
b. Microsoft Sentinel
5. Partner with DevOps
a. More Agile and skilled than conventional IT
b. Lateral hiring
Leveraging Native Services - AWS Example
Source : https://www.sans.org/webcasts/enhance-efficiency-soc-aws-cloud-112950/
AWS WorkFlow Example
SIEM
Solution
Source : https://www.sans.org/webcasts/enhance-efficiency-soc-aws-cloud-112950/
Way forward
A suggested Roadmap !
1. Have basic Cyber Hygiene in place - CIS Critical controls
a. Asset Inventory, Patching, EDR/AV, DLP, SWG
b. Enable Cloud Native controls
2. SOC Fundamentals
a. Know your Data Sources and Build your Use Cases
b. Decide your model - Hybrid or In House or Outsourced
c. Define KPIs for testing effectiveness of SOC
3. Evaluation and Selection
a. Set up a Open Source Security Logging and Monitoring Setup first
b. Do a POC before deciding on your SIEM solution and SOC Partner
Thanks
SIEM - The Holy grail ?
1. Can you set up a SOC without it ?
2. Log Management and Correlation
3. What about SOC Automation ?
4. Can it take all Log sources or you need to build custom parsers ?
5. How will you control the log volume ?
6. Or Price yourself out of your allocated budget / Bandwidth !
7. SAAS or Self Hosted ( On Prem vs Cloud)
Value Add ons
1. UEBA - User Event Behavioral Analytics
2. SOAR - SOC Automation
3. Add Ons
a. Brand Monitoring
b. Dark Web Monitoring
c. EDR - This alone can solve lots of your use cases
d. XDR - Needs to mature
Top Questions
1. Model
a. In house , Completely Outsourced or Hybrid
2. Which SIEM Solution ?
a. SAAS vs Deployed,
b. Open Source vs Commercial
3. How do you get Budgets ?
4. How will show its ROI ?
a. Solve Business Problems
b. Meet Compliance Mandates
5. How will it enhance your security capability ?
a. Detect and prevent Cyber Attacks
Key Factors in Building a SOC
Cost - Never Infinite
Timeline - 3 - 6 months
Maturity - 6 - 12 months - Better you plan, more you will reduce this duration
ROI - Difficult to measure and show- BUT Essential to Demonstrate
People with right Attitude and skill sets
Right Partner - MSP or Consultant
References
1. Demystifying the SOC - Medium articles by Gorka Sadowski
2. Ten Strategies of a World-Class Cybersecurity Operations Center - Mitre
Corporation
3. https://www.cisoplatform.com/profiles/blogs/evolving-soc-to-cloud-detections
4. https://blogs.gartner.com/pete-shoard/use-the-gartner-soc-hit-model/
5. https://www.exabeam.com/security-operations-center/security-operations-
center-a-quick-start-guide/
6. https://www.sans.org/webcasts/enhance-efficiency-soc-aws-cloud-112950/

More Related Content

PDF
Hunting Lateral Movement in Windows Infrastructure
Sergey Soldatov
 
PPTX
7 Steps to Build a SOC with Limited Resources
LogRhythm
 
PPTX
Building an Analytics - Enabled SOC Breakout Session
Splunk
 
PPT
Introduction to Cyber Security
Stephen Lahanas
 
PDF
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 
PDF
APIsecure 2023 - Learning from a decade of API breaches and why application-c...
apidays
 
PDF
Data Loss Threats and Mitigations
April Mardock CISSP
 
PDF
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
EnterpriseGRC Solutions, Inc.
 
Hunting Lateral Movement in Windows Infrastructure
Sergey Soldatov
 
7 Steps to Build a SOC with Limited Resources
LogRhythm
 
Building an Analytics - Enabled SOC Breakout Session
Splunk
 
Introduction to Cyber Security
Stephen Lahanas
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 
APIsecure 2023 - Learning from a decade of API breaches and why application-c...
apidays
 
Data Loss Threats and Mitigations
April Mardock CISSP
 
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
EnterpriseGRC Solutions, Inc.
 

What's hot (20)

PDF
Cyber threat intelligence ppt
Kumar Gaurav
 
PPTX
SOC Cyber Security
Steppa Cyber Security
 
PPTX
Effective Security Operation Center - present by Reza Adineh
ReZa AdineH
 
PDF
Threat Hunting Procedures and Measurement Matrice
Vishal Kumar
 
PPT
Cyber Risks
RickWaldman
 
PDF
Best Practices for Implementing Data Loss Prevention (DLP)
Sarfaraz Chougule
 
PDF
ATT&CK Updates- ATT&CK's Open Source
MITRE ATT&CK
 
PPTX
An introduction to SOC (Security Operation Center)
Ahmad Haghighi
 
PDF
Threat Intelligence
Deepak Kumar (D3)
 
PPTX
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Sounil Yu
 
PDF
Cobit 5 for information security
Elkanouni Mohamed
 
PPTX
Cyber Terrorism
Deepak Pareek
 
PDF
Building a Next-Generation Security Operations Center (SOC)
Sqrrl
 
PPTX
Domain 1 - Security and Risk Management
Maganathin Veeraragaloo
 
PPTX
Mobile security in Cyber Security
Geo Marian
 
PPTX
Security Operations Center (SOC) Essentials for the SME
AlienVault
 
PPTX
Cyber Threat Intelligence
Prachi Mishra
 
PDF
ファーストアカウンティング会社説明資料 for engineer 2022年7月版
ファーストアカウンティング 採用担当
 
PDF
Cyber security career development paths
Chelsea Jarvie
 
PDF
Ciberseguridad en el mundo de la IA
Cristian Garcia G.
 
Cyber threat intelligence ppt
Kumar Gaurav
 
SOC Cyber Security
Steppa Cyber Security
 
Effective Security Operation Center - present by Reza Adineh
ReZa AdineH
 
Threat Hunting Procedures and Measurement Matrice
Vishal Kumar
 
Cyber Risks
RickWaldman
 
Best Practices for Implementing Data Loss Prevention (DLP)
Sarfaraz Chougule
 
ATT&CK Updates- ATT&CK's Open Source
MITRE ATT&CK
 
An introduction to SOC (Security Operation Center)
Ahmad Haghighi
 
Threat Intelligence
Deepak Kumar (D3)
 
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Sounil Yu
 
Cobit 5 for information security
Elkanouni Mohamed
 
Cyber Terrorism
Deepak Pareek
 
Building a Next-Generation Security Operations Center (SOC)
Sqrrl
 
Domain 1 - Security and Risk Management
Maganathin Veeraragaloo
 
Mobile security in Cyber Security
Geo Marian
 
Security Operations Center (SOC) Essentials for the SME
AlienVault
 
Cyber Threat Intelligence
Prachi Mishra
 
ファーストアカウンティング会社説明資料 for engineer 2022年7月版
ファーストアカウンティング 採用担当
 
Cyber security career development paths
Chelsea Jarvie
 
Ciberseguridad en el mundo de la IA
Cristian Garcia G.
 
Ad

Similar to Security Operations Cloud vs On Prem ISC2 Bangalore SlideShare.pptx (20)

PPTX
Rothke rsa 2012 building a security operations center (soc)
Ben Rothke
 
PDF
Building a Security Operations Center (SOC).pdf
TapOffice
 
PDF
DTS Solution - Building a SOC (Security Operations Center)
Shah Sheikh
 
PPT
Security Outsourcing - Couples Counseling - Atif Ghauri
Atif Ghauri
 
PDF
From SIEM to SOC: Crossing the Cybersecurity Chasm
Priyanka Aash
 
PPTX
SOC Meets Cloud: What Breaks, What Changes, What to Do?
Anton Chuvakin
 
PPTX
McAfee SIEM solution
hashnees
 
PPTX
New Horizons SCYBER Presentation
New Horizons Computer Learning Centers / 5PE
 
PDF
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
JustinBrown267905
 
PDF
The SIEM Buyer Guide the siem buyer guide
roongrus
 
PDF
Rothke secure360 building a security operations center (soc)
Ben Rothke
 
PPTX
Prezentare_ANSSI.pptx gfdsry crsru drdrsy
Azim191210
 
PDF
Corona| COVID IT Tactical Security Preparedness: Threat Management
RedZone Technologies
 
PPTX
DevSecCon Keynote
Shannon Lietz
 
PPTX
DevSecCon KeyNote London 2015
Shannon Lietz
 
PPTX
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
Anton Chuvakin
 
PDF
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
ParishSummer
 
PPTX
How To Select Security Orchestration Vendor
Siemplify
 
PDF
Its Not You Its Me MSSP Couples Counseling
Atif Ghauri
 
PDF
Cybersecurity_Security_architecture_2023.pdf
abacusgtuc
 
Rothke rsa 2012 building a security operations center (soc)
Ben Rothke
 
Building a Security Operations Center (SOC).pdf
TapOffice
 
DTS Solution - Building a SOC (Security Operations Center)
Shah Sheikh
 
Security Outsourcing - Couples Counseling - Atif Ghauri
Atif Ghauri
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
Priyanka Aash
 
SOC Meets Cloud: What Breaks, What Changes, What to Do?
Anton Chuvakin
 
McAfee SIEM solution
hashnees
 
New Horizons SCYBER Presentation
New Horizons Computer Learning Centers / 5PE
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
JustinBrown267905
 
The SIEM Buyer Guide the siem buyer guide
roongrus
 
Rothke secure360 building a security operations center (soc)
Ben Rothke
 
Prezentare_ANSSI.pptx gfdsry crsru drdrsy
Azim191210
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
RedZone Technologies
 
DevSecCon Keynote
Shannon Lietz
 
DevSecCon KeyNote London 2015
Shannon Lietz
 
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
Anton Chuvakin
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
ParishSummer
 
How To Select Security Orchestration Vendor
Siemplify
 
Its Not You Its Me MSSP Couples Counseling
Atif Ghauri
 
Cybersecurity_Security_architecture_2023.pdf
abacusgtuc
 
Ad

Recently uploaded (20)

PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
REPORT: Heating appliances market in Poland 2024
SPIUG
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
REPORT: Heating appliances market in Poland 2024
SPIUG
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 

Security Operations Cloud vs On Prem ISC2 Bangalore SlideShare.pptx

  • 1. Security Operations Cloud vs On Prem SOC for Cloud Native Companies Vikas Yadav
  • 2. Little bit about Myself Current Current: CISO at Nykaa Prior CISO Max Life MTech IIT Kharagpur, CISSP, CCSK Military Veteran Outside Work Sports - Tennis, Golf, Trekking Reading Online Courses Love Travelling
  • 3. Agenda 1. Need for a SOC 2. What is a SOC 3. Security Operations - Cyber Hygiene 4. SOC Essential Components 5. SOC Maturity 6. Modern SOC 7. SOC for Cloud Environments
  • 4. Need for SOC ! ● Security Roadmap Item No 3 - Our Consultant told us. ● FOMO - Everyone has it. ● Tick in the Box - Regulatory Requirement. ○ CERT-IN / GDPR mandates 72 hr reporting ● Prevention is not Enough ! - Incident Detection and Response - Help respond and recover faster.
  • 5. What are your trying to solve ? ● Business Problems ○ Fraud ○ Data Leakage ○ Ransomware ● Technical Challenges/ Security Gaps ○ Need to detect cyber attacks timely ○ Correlate alerts coming from different sources ● Process Issues ○ Too many disparate security solutions ○ No coordinate way to detect and prevent attacks
  • 6. Security Operations vs Log Aggregation 1. Do you Monitors events and logs ? 2. Correlate and add context to detect a breach/attack ? 3. Performs investigations to understand root cause and mitigate impact ? 4. Coordinate with IT/ DevOps to to address the breach ? 5. Seek external help - Incident Response firm ? 6. Inform Senior management. 7. Take Remedial Action and document Lessons Learned ?
  • 7. What is SOC ? A SOC is a team primarily composed of security analysts organized to detect, analyze, respond to, report on, and prevent cybersecurity incidents. A SOC is traditionally a physical facility within an organization, which houses an information security team. This team analyzes and monitors the organization’s security systems. The SOC’s mission is to protect the company from security breaches by identifying, analyzing, and reacting to cybersecurity threats. A security operations center (SOC) can be defined both as a team, often operating in shifts around the clock, and a facility dedicated to and organized to prevent, detect, assess and respond to cybersecurity threats and incidents, and to fulfill and assess regulatory compliance.
  • 9. Essential components of a SOC SNo Component Purpose Sample Gaps 1 PEOPLE - SOC Staff To monitor alerts , To triage , To respond, To recover NOT TO RAISE A TICKET No Designated Person or Structure 2 SOC PROCESSES Should be simple and effective Playbooks should be defined No Processes defined No one to look at alerts No ticketing systems 3 TECH Stack AV/ EDR, SWG, Firewalls SIEM - Logging and Correlation SOAR - Automation Inadequate Logging Not centralised 4 Data Sources Logs Central Solution - SIEM or Log Management Solution No SIEM Automation 5 Threat Intel IOCs Intelligence Feeds No Threat Intel No Intelligence Feeds 6 Use Cases Detect and Prevent Attacks Use Cases Relevant
  • 10. SOC Maturity Model Source: Gorka Sadowski Medium Article - New-soc-maturity-model-based-on-outcomes
  • 11. Modern SOC - Outcome Based Source: Gorka Sadowski Medium Article - New-soc-maturity-model-based-on-outcomes
  • 12. Security Operations in Cloud SOC for Cloud environments
  • 13. How things change in Cloud ? 1. People a. Conventional SOC analysts do not understand Cloud b. Need people with new Skill Sets 2. Technology a. Threat Model changes - You do not own Infra. b. Multi Cloud environment and SAAS applications c. Log Volume increases exponentially ( Web systems) d. Egress Costs e. Uncommon Log Collection methods 3. Processes a. Easier to automate b. Conventional slow processes may not work with DevOps team 4. Advantages a. Lot of controls out of the box - Native Security Controls b. AWS Guard Duty, Detective
  • 14. Suggested strategies 1. Prioritise Visibility 2. Leverage new Tools a. CASB - Cloud Access Security Broker b. CSPM Cloud Security Posture Managements 3. Leverage Native Controls a. AI ML - AWS Guard Duty/ AWS Detective 4. Prefer Cloud and Native SIEMs( Egress Cost !) a. Google Chronicle/SUMO Logic/Elastic b. Microsoft Sentinel 5. Partner with DevOps a. More Agile and skilled than conventional IT b. Lateral hiring
  • 15. Leveraging Native Services - AWS Example Source : https://www.sans.org/webcasts/enhance-efficiency-soc-aws-cloud-112950/
  • 16. AWS WorkFlow Example SIEM Solution Source : https://www.sans.org/webcasts/enhance-efficiency-soc-aws-cloud-112950/
  • 18. A suggested Roadmap ! 1. Have basic Cyber Hygiene in place - CIS Critical controls a. Asset Inventory, Patching, EDR/AV, DLP, SWG b. Enable Cloud Native controls 2. SOC Fundamentals a. Know your Data Sources and Build your Use Cases b. Decide your model - Hybrid or In House or Outsourced c. Define KPIs for testing effectiveness of SOC 3. Evaluation and Selection a. Set up a Open Source Security Logging and Monitoring Setup first b. Do a POC before deciding on your SIEM solution and SOC Partner
  • 20. SIEM - The Holy grail ? 1. Can you set up a SOC without it ? 2. Log Management and Correlation 3. What about SOC Automation ? 4. Can it take all Log sources or you need to build custom parsers ? 5. How will you control the log volume ? 6. Or Price yourself out of your allocated budget / Bandwidth ! 7. SAAS or Self Hosted ( On Prem vs Cloud)
  • 21. Value Add ons 1. UEBA - User Event Behavioral Analytics 2. SOAR - SOC Automation 3. Add Ons a. Brand Monitoring b. Dark Web Monitoring c. EDR - This alone can solve lots of your use cases d. XDR - Needs to mature
  • 22. Top Questions 1. Model a. In house , Completely Outsourced or Hybrid 2. Which SIEM Solution ? a. SAAS vs Deployed, b. Open Source vs Commercial 3. How do you get Budgets ? 4. How will show its ROI ? a. Solve Business Problems b. Meet Compliance Mandates 5. How will it enhance your security capability ? a. Detect and prevent Cyber Attacks
  • 23. Key Factors in Building a SOC Cost - Never Infinite Timeline - 3 - 6 months Maturity - 6 - 12 months - Better you plan, more you will reduce this duration ROI - Difficult to measure and show- BUT Essential to Demonstrate People with right Attitude and skill sets Right Partner - MSP or Consultant
  • 24. References 1. Demystifying the SOC - Medium articles by Gorka Sadowski 2. Ten Strategies of a World-Class Cybersecurity Operations Center - Mitre Corporation 3. https://www.cisoplatform.com/profiles/blogs/evolving-soc-to-cloud-detections 4. https://blogs.gartner.com/pete-shoard/use-the-gartner-soc-hit-model/ 5. https://www.exabeam.com/security-operations-center/security-operations- center-a-quick-start-guide/ 6. https://www.sans.org/webcasts/enhance-efficiency-soc-aws-cloud-112950/

Editor's Notes

  • #3: Use images rather than text
  • #10: Convert into a Picture
  • #12: https://gorkasadowski.medium.com/demystifying-the-soc-part-5-the-new-soc-maturity-model-based-on-outcomes-7746402130e0