SlideShare a Scribd company logo
1 of 8
Download to read offline
CyberSecurity Automation
SOC Managers Should CARE About
Introduction
While a most of us make goals for individual
change in the New Year, important changes
in our business lives require more timely
arrangement, particularly when those
progressions require spending plans,
endorsements and interior help.
What Does A SOC Manager
As SOC manager and executives work out
and develop their security tasks groups, a
few things will dependably stay consistent.
In particular, the should be reliably centered
around identifying, examining and
remediating dangers. However, how you
approach those center capacities ought to
be rethought consistently to keep pace with
rising dangers and advancements, and to
take advantage of past learning.
Don’t Just Correlate – Contextualize
We've seen a pivot over the past years with how SOCs function. Before, SOCs
relied upon system traffic and log information to give a relevant perspective of
the system, generally dependent on north/south traffic development. SOC
managers must be centered around how to best apply layers all through the
earth for compelling guard. Going ahead, this implies successfully using
endpoint location and reaction (EDR) related to different advances that feed
logs and alarms into a SIEM, and after that utilizing security orchestration for
full logical perception of an assault.
Automate Repetitive Tasks
After you've secured your association with the capacity to all the more
adequately track and distinguish assaults as they travel through the earth, the
following consistent advance is to computerize parts of this procedure. By
applying security automation, SOC supervisors can quicken their main goal of
recognizing and remediating dangers, just as enhance in general security tasks
execution by bringing mean time down to distinguish and mean time to react.
What's more, automation can decrease the general hazard to an association by
helping security tasks group bring down aggressor stay time.
Relentlessly Focus on Remediation
As a SOC manager, remediation and
recuperation is the true objective for
occurrences that happen in the system.
Security tasks groups must keep on going
past disclosure of alarms and work pair with
occurrence reaction groups to anchor a
situation. To do as such, custom playbooks
and runbooks ought to be set up for experts
to pursue when cautions emerge.
Get Serious About Education
By a wide margin one of the best regions that a SOC manager can put
resources into is training. Cybersecurity orchestration is certifiably not a
dormant field and remaining taught about developing dangers and strategies is
imperative as you manage your group in the identification and remediation of
security occasions. Instruction is a standout amongst the most incredible
assets you can incorporate into your financial plan and culture. If you don't
prepare your examiners, not exclusively will you have a less compelling group,
however you'll lose them to different jobs or associations willing to give
nonstop learning or confirmations.
Conclusion
By putting resources into setting,
mechanization, remediation and training, you
are at last decreasing your association's
helplessness to a break. As you conclude
your security tasks spending plan for 2019,
guarantee you dispense enough in these four
zones to drive your security activities group
toward more noteworthy development,
enhanced productivity and higher viability.

More Related Content

What's hot

Risk management in insurance sector
Risk management in insurance sectorRisk management in insurance sector
Risk management in insurance sector
Grc Vikram Reddy
 
Operational Risk Management
Operational Risk ManagementOperational Risk Management
Operational Risk Management
arsqureshi
 
Business Continuity Management
Business Continuity ManagementBusiness Continuity Management
Business Continuity Management
ECC International
 
Risk In Our Society
Risk In Our SocietyRisk In Our Society
Risk In Our Society
daryl10
 

What's hot (20)

Cyber Security IT GRC Management Model and Methodology.
Cyber Security IT GRC Management Model and Methodology.Cyber Security IT GRC Management Model and Methodology.
Cyber Security IT GRC Management Model and Methodology.
 
Basel iv
Basel ivBasel iv
Basel iv
 
COSO ERM Framework
COSO ERM FrameworkCOSO ERM Framework
COSO ERM Framework
 
Principles of insurance
Principles of insurancePrinciples of insurance
Principles of insurance
 
NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101  NIST Cybersecurity Framework 101
NIST Cybersecurity Framework 101
 
Risk Appetite
Risk AppetiteRisk Appetite
Risk Appetite
 
Princing insurance contracts with R
Princing insurance contracts with RPrincing insurance contracts with R
Princing insurance contracts with R
 
Risk management in insurance sector
Risk management in insurance sectorRisk management in insurance sector
Risk management in insurance sector
 
10 Key Principles of Operational Risk Management
10 Key Principles of Operational Risk Management10 Key Principles of Operational Risk Management
10 Key Principles of Operational Risk Management
 
Business Continuity Management
Business Continuity ManagementBusiness Continuity Management
Business Continuity Management
 
Risks & its types
Risks & its typesRisks & its types
Risks & its types
 
ICT Risk Management and ICT third party risk Objectives
ICT Risk Management and ICT third party risk Objectives ICT Risk Management and ICT third party risk Objectives
ICT Risk Management and ICT third party risk Objectives
 
Operational Risk Management
Operational Risk ManagementOperational Risk Management
Operational Risk Management
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Business Continuity Management
Business Continuity ManagementBusiness Continuity Management
Business Continuity Management
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
Ten Ways to Improve Specialty Lines Underwriting
Ten Ways to Improve Specialty Lines UnderwritingTen Ways to Improve Specialty Lines Underwriting
Ten Ways to Improve Specialty Lines Underwriting
 
Risk In Our Society
Risk In Our SocietyRisk In Our Society
Risk In Our Society
 
Introduction of general insurance
Introduction of general insuranceIntroduction of general insurance
Introduction of general insurance
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 

Similar to CyberSecurity Automation

The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
Sergey Erohin
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
Sergey Erohin
 
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENTTHE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
IJNSA Journal
 
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENTTHE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
IJNSA Journal
 
Targeted Solutions BMS Profile
Targeted Solutions BMS ProfileTargeted Solutions BMS Profile
Targeted Solutions BMS Profile
Leon Geldenhuys
 
How Do You Create A Successful Information Security Program Hire A Great Iso!!
How Do You Create A Successful Information Security Program  Hire A Great Iso!!How Do You Create A Successful Information Security Program  Hire A Great Iso!!
How Do You Create A Successful Information Security Program Hire A Great Iso!!
Tammy Clark
 
What sssts safety training involves
What sssts safety training  involvesWhat sssts safety training  involves
What sssts safety training involves
codycunningham86
 

Similar to CyberSecurity Automation (20)

Cyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadCyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor upload
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chain
 
CyberSecurity Strategy For Defendable ROI
CyberSecurity Strategy For Defendable ROICyberSecurity Strategy For Defendable ROI
CyberSecurity Strategy For Defendable ROI
 
For Corporate Boards, a Cyber Security Top 10
For Corporate Boards, a Cyber Security Top 10For Corporate Boards, a Cyber Security Top 10
For Corporate Boards, a Cyber Security Top 10
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
 
Successful DevSecOps Organizations - by Dawid Balut
Successful DevSecOps Organizations - by Dawid BalutSuccessful DevSecOps Organizations - by Dawid Balut
Successful DevSecOps Organizations - by Dawid Balut
 
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENTTHE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
 
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENTTHE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
 
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKSRISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
RISK MANAGEMENT: 4 ESSENTIAL FRAMEWORKS
 
Targeted Solutions BMS Profile
Targeted Solutions BMS ProfileTargeted Solutions BMS Profile
Targeted Solutions BMS Profile
 
How Do You Create A Successful Information Security Program Hire A Great Iso!!
How Do You Create A Successful Information Security Program  Hire A Great Iso!!How Do You Create A Successful Information Security Program  Hire A Great Iso!!
How Do You Create A Successful Information Security Program Hire A Great Iso!!
 
Department of Homeland Security Guidance
Department of Homeland Security GuidanceDepartment of Homeland Security Guidance
Department of Homeland Security Guidance
 
DHS Guidelines
DHS GuidelinesDHS Guidelines
DHS Guidelines
 
Cybersecurity Incident Response Planning.pdf
Cybersecurity Incident Response Planning.pdfCybersecurity Incident Response Planning.pdf
Cybersecurity Incident Response Planning.pdf
 
Coordinating Security Response and Crisis Management Planning
Coordinating Security Response and Crisis Management PlanningCoordinating Security Response and Crisis Management Planning
Coordinating Security Response and Crisis Management Planning
 
Physical security roi
Physical security roi Physical security roi
Physical security roi
 
What is an IANS CISO Workshop? Factor 2
What is an IANS CISO Workshop? Factor 2What is an IANS CISO Workshop? Factor 2
What is an IANS CISO Workshop? Factor 2
 
What sssts safety training involves
What sssts safety training  involvesWhat sssts safety training  involves
What sssts safety training involves
 
Security Orchestration, Automation & Incident Response
Security Orchestration, Automation & Incident ResponseSecurity Orchestration, Automation & Incident Response
Security Orchestration, Automation & Incident Response
 

More from Siemplify

More from Siemplify (19)

MSSP Security Orchestration Shopping List
MSSP Security Orchestration Shopping ListMSSP Security Orchestration Shopping List
MSSP Security Orchestration Shopping List
 
Benefits of Semi Automation - Learn Security Analysis A Lot From Football
Benefits of Semi Automation - Learn Security Analysis A Lot From FootballBenefits of Semi Automation - Learn Security Analysis A Lot From Football
Benefits of Semi Automation - Learn Security Analysis A Lot From Football
 
Should You Be Automating
Should You Be AutomatingShould You Be Automating
Should You Be Automating
 
How To Select Security Orchestration Vendor
How To Select Security Orchestration VendorHow To Select Security Orchestration Vendor
How To Select Security Orchestration Vendor
 
Petya Ransomware
Petya RansomwarePetya Ransomware
Petya Ransomware
 
What is Security Orchestration?
What is Security Orchestration?What is Security Orchestration?
What is Security Orchestration?
 
MSSP - Security Orchestration & Automation
MSSP - Security Orchestration & AutomationMSSP - Security Orchestration & Automation
MSSP - Security Orchestration & Automation
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Building A Security Operations Center
Building A Security Operations CenterBuilding A Security Operations Center
Building A Security Operations Center
 
Cyber Security & Cyber Security Threats
Cyber Security & Cyber Security ThreatsCyber Security & Cyber Security Threats
Cyber Security & Cyber Security Threats
 
Need Of Security Operations Over SIEM
Need Of Security Operations Over SIEMNeed Of Security Operations Over SIEM
Need Of Security Operations Over SIEM
 
Need of SIEM when You have SOAR
Need of SIEM when You have SOARNeed of SIEM when You have SOAR
Need of SIEM when You have SOAR
 
Security Operations Strategies
Security Operations Strategies Security Operations Strategies
Security Operations Strategies
 
Incident Response Test
Incident Response TestIncident Response Test
Incident Response Test
 
Security Automation and Machine Learning
Security Automation and Machine LearningSecurity Automation and Machine Learning
Security Automation and Machine Learning
 
Security Orchestration Made Simple
Security Orchestration Made SimpleSecurity Orchestration Made Simple
Security Orchestration Made Simple
 
Security automation system
Security automation systemSecurity automation system
Security automation system
 
Automated incident response
Automated incident responseAutomated incident response
Automated incident response
 
Introducing Siemplify V4.25 - Security Orchestration, Automation And Response...
Introducing Siemplify V4.25 - Security Orchestration, Automation And Response...Introducing Siemplify V4.25 - Security Orchestration, Automation And Response...
Introducing Siemplify V4.25 - Security Orchestration, Automation And Response...
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 

CyberSecurity Automation

  • 2. Introduction While a most of us make goals for individual change in the New Year, important changes in our business lives require more timely arrangement, particularly when those progressions require spending plans, endorsements and interior help.
  • 3. What Does A SOC Manager As SOC manager and executives work out and develop their security tasks groups, a few things will dependably stay consistent. In particular, the should be reliably centered around identifying, examining and remediating dangers. However, how you approach those center capacities ought to be rethought consistently to keep pace with rising dangers and advancements, and to take advantage of past learning.
  • 4. Don’t Just Correlate – Contextualize We've seen a pivot over the past years with how SOCs function. Before, SOCs relied upon system traffic and log information to give a relevant perspective of the system, generally dependent on north/south traffic development. SOC managers must be centered around how to best apply layers all through the earth for compelling guard. Going ahead, this implies successfully using endpoint location and reaction (EDR) related to different advances that feed logs and alarms into a SIEM, and after that utilizing security orchestration for full logical perception of an assault.
  • 5. Automate Repetitive Tasks After you've secured your association with the capacity to all the more adequately track and distinguish assaults as they travel through the earth, the following consistent advance is to computerize parts of this procedure. By applying security automation, SOC supervisors can quicken their main goal of recognizing and remediating dangers, just as enhance in general security tasks execution by bringing mean time down to distinguish and mean time to react. What's more, automation can decrease the general hazard to an association by helping security tasks group bring down aggressor stay time.
  • 6. Relentlessly Focus on Remediation As a SOC manager, remediation and recuperation is the true objective for occurrences that happen in the system. Security tasks groups must keep on going past disclosure of alarms and work pair with occurrence reaction groups to anchor a situation. To do as such, custom playbooks and runbooks ought to be set up for experts to pursue when cautions emerge.
  • 7. Get Serious About Education By a wide margin one of the best regions that a SOC manager can put resources into is training. Cybersecurity orchestration is certifiably not a dormant field and remaining taught about developing dangers and strategies is imperative as you manage your group in the identification and remediation of security occasions. Instruction is a standout amongst the most incredible assets you can incorporate into your financial plan and culture. If you don't prepare your examiners, not exclusively will you have a less compelling group, however you'll lose them to different jobs or associations willing to give nonstop learning or confirmations.
  • 8. Conclusion By putting resources into setting, mechanization, remediation and training, you are at last decreasing your association's helplessness to a break. As you conclude your security tasks spending plan for 2019, guarantee you dispense enough in these four zones to drive your security activities group toward more noteworthy development, enhanced productivity and higher viability.