Главная
Study mode:
on
1
Introduction
2
About Jamie Murdock
3
About Steve
4
What is SOC
5
SOC Definition
6
Why do you need a SOC
7
Who really cares
8
We dont have to worry
9
You dont have to worry
10
Users are the smartest people
11
Employees will never be a concern
12
Zombies
13
Loops
14
Automation
15
Where do I start
16
Create a workflow
17
Tools
18
Build a Solution
19
Maintenance
20
Testing Acceptance
21
Threat Modeling
22
Monitoring
23
System hardening
24
Network hardening
25
Web filtration
26
Endpoint security
27
Incident response
28
Response plan
29
Internal breach report
30
Live Demo
31
Contact Info
Description:
Learn how to establish and operate a one-person Security Operations Center (SOC) in this 38-minute conference talk from Derbycon 2012. Explore the definition and importance of a SOC, address common misconceptions, and discover practical steps to implement a SOC workflow. Gain insights into essential tools, solution building, maintenance, and testing procedures. Delve into crucial aspects such as threat modeling, monitoring, system and network hardening, web filtration, endpoint security, and incident response planning. Conclude with a live demonstration and access to contact information for further guidance.

How to Create a One-Man Security Operations Center (SOC)

Add to list
0:00 / 0:00