SOC Evolution Is About More Than Automation

Among the most critical concerns in the cybersecurity community is the apparent scarcity of a workforce with the requisite skills and training to keep pace with the expanding attack surface.
According to recent research from ISC2, the global industry could benefit from over 3 million additional cybersecurity professionals.
The natural growth of IT infrastructure and digital commerce are among the drivers of increased demand for cybersecurity jobs and have consequently broadened the threat landscape while incentivizing cybercriminals.
A simple - and popular - solution to the security talent shortage has seen cybersecurity providers increasingly implementing automated tools in SOC operations.
On a fundamental level, this allows for traditionally monotonous tasks to be maintained while freeing our teams to focus manual efforts on cognitive decision-making.
The vast quantities of information relayed by automated tools therefore bring SOC teams their fair share of pros and cons.
Ultimately, the modern SOC requires a solid procedural foundation, but also a new set of processes that rely on human innovation.
Striking a balance between human creativity and automation.
For SOCs, discernment may be found along a continuum.
On one side, alert triage as well as reporting and metrics benefit significantly from the consistency of automation, while quality threat modeling and hunting are rewarded with the creativity of human innovation.
Automated and cloud-enabled services have allowed organizations to sift through data at unprecedented volumes, and with proper investment can ensure that SOCs are optimizing their continuous management of detection rules.
Injecting human creativity into your SOC is a benefit to the human team as well as to the automated operations.
Striking this balance between each set of strengths while remaining cognizant of shortcomings is critical to deploying a consummate SOC. Utilizing Proactive Threat Intelligence.
Presently, SOC teams are fully aware that threat intelligence operations and management are well worth the time and effort.
The goal for a superior SOC should be to take advantage of proactivity that drives the creating and tuning of unique security controls.
The MITRE ATT&CK framework is a fine example of how SOC teams can evolve with a proactive, informed approach to threat-defense.
Since its creation nearly a decade ago, the framework has benefitted teams previously using threat intelligence in a reactive mode to dynamically drive the creation and fine-tuning of security controls.
This allows SOC teams to significantly reduce erroneous alerts and focus their time and energy on the alerts stemming from specialized rules meant to protect their organization's specialized assets.
The Future of the SOC. While the hybrid model of SOCs and the workforce behind them may require evolution, our understanding needn't follow suit.
SOC modernization extends far beyond technology alone, providing organizations with an opportunity to reassess skills and roles and support a distributed workforce - while incorporating human creativity and innovation as a strategic force multiplier.


This Cyber News was published on www.cybersecurity-insiders.com. Publication date: Wed, 07 Feb 2024 20:43:04 +0000


Cyber News related to SOC Evolution Is About More Than Automation

The Importance of SOC 2 Templates - Between navigating the SOC 2 landscape and implementing the proper controls and security systems, the to-do list quickly becomes overwhelming. Many tasks required for successful SOC 2 compliance don't come with a 'how-to' manual. In this piece, we're ...
6 months ago Securityboulevard.com
SOC Evolution Is About More Than Automation - Among the most critical concerns in the cybersecurity community is the apparent scarcity of a workforce with the requisite skills and training to keep pace with the expanding attack surface. According to recent research from ISC2, the global industry ...
4 months ago Cybersecurity-insiders.com
CVE-2019-5303 - There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing ...
6 months ago
CVE-2019-5302 - There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing ...
6 months ago
WTH is Modern SOC, Part 1 - Back in 2016 when I was a Gartner analyst, I was obsessed with the same question. As I said in my now-dead Gartner blog, a lot of security operation centers looked like they were built on a blueprint of a classic paper written by somebody from ...
6 months ago Securityboulevard.com
Unlocking Security Excellence: The Power of SOC-as-a-Service - In today's interconnected digital landscape, organizations face a constant barrage of cyberthreats. The increasing complexity and sophistication of these attacks require robust security measures to safeguard sensitive data and ensure business ...
6 months ago Securityboulevard.com
A Comprehensive Guide To Achieving SOC 2 Compliance - Obtaining SOC 2 compliance demonstrates an organization's commitment to data security and privacy, which can enhance trust and confidence among customers and partners. SOC 2 is a framework developed by the AICPA to assess the various trust service ...
4 months ago Feeds.dzone.com
Energy-Efficient Home Automation: Saving the Planet and Your Wallet - Home automation solutions offer an array of benefits, from improved convenience to decreased energy bills. This article will explore the types of home automation systems available, as well as their cost and potential for energy efficiency. The ...
6 months ago Securityzap.com
Home Automation for All: Enabling Independence - As technology advances, home automation provides a sense of empowerment for elderly and disabled individuals. Home automation for the elderly and disabled reduces dependence on others and promotes independence in the home environment. Home automation ...
6 months ago Securityzap.com
Why RV Connex Chose Swimlane As "The Powerhouse" Of Their SOC - RV Connex is a Thailand-based company that specializes in national defense and space manufacturing. Since RV Connex has implemented security automation they have achieved significant progress. Tanajak Watanakij, Vice President of Cybersecurity and ...
6 months ago Securityboulevard.com
Cisco XDR: SLEDs "SOC in a Box" - For State, Local, and Education entities the Security Operations Center is a required tool in the toolbox and a necessity for Cyber Insurance. Threats to data and information are ever evolving, and better safeguarding the security of SLED entities is ...
6 months ago Feedpress.me
How to Get Started With Security Automation: Consider the Top Use Cases Within Your Industry - As the cybersecurity industry has matured, so has the approach security teams take to making decisions about investing in security tools. Instead of focusing on the latest product or technology, security professionals are focused on use cases such as ...
5 months ago Securityweek.com
AI and Automation - In recent years, developments in artificial intelligence and automation technology have drastically reshaped application security. On one hand, the progress in AI and automation has strengthened security mechanisms, reduced reaction times, and ...
6 months ago Feeds.dzone.com
Do More with Security Orchestration, Automation, and Response - Today, security operations center teams face dual challenges of acquiring both the right caliber and quantity of staff. With this gap, it's important for SOC teams to consider security, orchestration, automation and response solutions to automate ...
5 months ago Securityboulevard.com
Cyber Insights 2023: Cyberinsurance - The result is more than a dozen features on subjects ranging from AI, quantum encryption, and attack surface management to venture capital, regulations, and criminal gangs. In 2022, Russia invaded Ukraine with the potential for more serious and more ...
1 year ago Securityweek.com
Microsoft is a Leader in the 2024 Gartner® Magic Quadrant™ for Security Information and Event Management​​ - We are pleased to announce that Microsoft has been recognized as a Leader in the Gartner® Magic Quadrant™ for Security Information and Event Management. 1 We believe our position in the Leaders quadrant validates our vision and continued ...
1 month ago Microsoft.com
Best practices for secure network automation workflows - Automation plays a critical role in modern networks. It helps network engineers manage networks with fewer repetitive manual tasks for greater agility. Network engineers cannot automate - or secure - what they don't understand. Understanding network ...
6 months ago Techtarget.com
The dawn of the autonomous enterprise is on the horizon - 90% of IT decision-makers plan to deploy more automation, including AI, in the next 12 months, according to Digitate. 26% of respondents plan to implement machine-operated tasks that require limited human input or fully transition to autonomous ...
6 months ago Helpnetsecurity.com
Achieving Continuous Compliance - If you've ever explored regulatory compliance and cybersecurity, you'll understand the importance of continuous compliance in the digital age, where evolving technology and regulations require constant vigilance. This article will cover the ...
6 months ago Feeds.dzone.com
Playbooks on-prem - To address this challenge, Sekoia.io has recently released Playbooks on-prem. In this way, Playbooks on-prem may appeal to companies seeking to synchronize cloud actions with those executed on-premises. At its core, Playbooks on-prem revolve around a ...
4 months ago Blog.sekoia.io
3 Best Practices for SOC Leaders for Staying Ahead In 2024 - For security operations center leaders, staying ahead of security threats is a substantial challenge as the cyberthreat landscape is constantly evolving. If SOC leaders fail to proactively monitor and readily adapt to these rising and ever-changing ...
4 months ago Securityboulevard.com
Don't Let AI Adoption Outpace Due Diligence - Our objective is to present different viewpoints and predictions on how artificial intelligence is impacting the current threat landscape, how PAN protects itself and its customers, as well as implications for the future of cybersecurity. Large ...
6 months ago Paloaltonetworks.com
Cyber Insights 2023: ICS and Operational Technology - The result is more than a dozen features on subjects ranging from AI, quantum encryption, and attack surface management to venture capital, regulations, and criminal gangs. At the same time, ICS/OT is facing an expanding attack surface caused by ...
1 year ago Securityweek.com
Fewer cybersecurity professionals losing their jobs in breach 'blame' game - Cybersecurity job loss after a major incident is becoming less likely as organizations drop the "Blame" game for more practical approaches to breach prevention, a survey of 500 CISOs shows. More than 95% of CISOs reported their teams received greater ...
7 months ago Scmagazine.com
Drata unveils Adaptive Automation for streamlined compliance - Drata has unveiled a new offering, Adaptive Automation. Augmenting the scope of continuous control monitoring and evidence collection, Adaptive Automation empowers GRC professionals to save time and automate even more of their compliance program ...
3 months ago Helpnetsecurity.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)