Learn how to establish and operate a one-person Security Operations Center (SOC) in this 38-minute conference talk from Derbycon 2012. Explore the definition and importance of a SOC, address common misconceptions, and discover practical steps to implement a SOC workflow. Gain insights into essential tools, solution building, maintenance, and testing procedures. Delve into crucial aspects such as threat modeling, monitoring, system and network hardening, web filtration, endpoint security, and incident response planning. Conclude with a live demonstration and access to contact information for further guidance.
How to Create a One-Man Security Operations Center (SOC)