Главная
Study mode:
on
1
Introduction
2
Challenges
3
Objectives
4
Recovery Times
5
Compliance Framework
6
Data aggregation
7
Key success factors
8
Change management
9
Processes
10
Data Recovery
11
Infrastructure
12
Asset Repository
13
Threat Cases
14
Offensive Naming Convention
15
Sock
16
Incident Response
17
Security Maturity
Description:
Explore the essential components and challenges of establishing a Cyber Security Operations Center in this DefCamp 2015 conference talk. Delve into key objectives, recovery times, compliance frameworks, and data aggregation strategies. Learn about critical success factors, change management processes, and infrastructure requirements. Discover the importance of asset repositories, threat cases, and offensive naming conventions. Gain insights into effective incident response techniques and methods for assessing security maturity. Enhance your understanding of cybersecurity operations and best practices in this comprehensive presentation from one of Central and Eastern Europe's most significant hacking and information security conferences.

Building a Cyber Security Operations Center - DefCamp 2015

DefCamp
Add to list
0:00 / 0:00