Transforming the SOC: Building Tomorrow's Security Operations, Today
When you think of a security operations center (SOC), what comes to mind? Is it an organized team of security analysts and engineers who detect, analyze, and respond to incidents, always working in lockstep with business managers to execute on the security strategy? Or, is it a few analysts who spend their days reactively responding to unprioritized security issues with a variety of point tools at their fingertips?
It's these variations, and the criticality of a SOC to detecting and responding to potential threats, that brought the Cyber Resilience Think Tank (CR Think Tank) together at RSA® Conference in February 2020, to explore the benefits and drawbacks of keeping a SOC in-house versus outsourcing it, and what a successful model might look like.
Read More
By submitting this form you agree to Mimecast contacting you with marketing-related emails or by telephone. You may unsubscribe at any time. Mimecast web sites and communications are subject to their Privacy Notice.
By requesting this resource you agree to our terms of use. All data is protected by our Privacy Notice. If you have any further questions please email dataprotection@techpublishhub.com
Related Categories: AIM, Artificial Intelligence, Collaboration, Compliance, Endpoint Security, ERP, Firewall, IT Security, Machine Learning, Malware, Network, SAN, Server, Software
More resources from Mimecast
Part Five - Futureproofing your cybersecurity...
Payment fraud occurs when a thief steals someone's payment information to make unauthorized transactions or purchases. Payment fraud is as old as m...
Part Four- Futureproofing your cybersecurity ...
Email account takeovers are among the most insidious and damaging cyberattacks—used to invade companies and then gradually and secretly cause har...
The Mimecast-Netskope-CrowdStrike Triple Play...
Security and IT organizations must protect against new attacks at scale — and safeguard data in use, at rest and in motion — in radically cloud...