Security Operation Center Management - v1.0
Security Operation Center Management - v1.0
Security Operation Center Management - v1.0
Cybersecurity is one of the biggest economic challenges countries face in the twenty-first century. The Middle
East is one of the most advanced regions when it comes to the speed of technology adoption and population
growth. Organizations in the Middle East are more prone to cyber threats compared to the rest of the world.
If you can’t measure
it, You can’t manage
it!
(Peter Drucker)
Today’s Discussion
Achieve an appropriate
maturity level of cyber
security controls
Ensure cyber security risks are
properly managed
• Security Incident Management Process 3.3.15 (1) Cyber Security Incident Management Process
• Threat Intelligence Management process 3.3.15 (2) Cyber Security Incident Management Process Measurement
• Forensic Investigation Process and Toolkit3.3.17 (1) Vulnerability Management (VM) Process
SOC
Security Incident & Event Monitoring System
EDR vs SIEM
EDR SIEM
Endpoint Detection and Response Security Information and Event
(EDR) Management
• Focus is on ENDPOINTS!!! <--- Yay! • Heavy emphasis on detection
• Capable of real-time detection • Near real-time
• Capable of real-time prevention • Capable of full network and
• Tend to be a one-stop shop for endpoint visibility
solution • Requires multiple moving parts
• Likely to require an agent
(agentless in the works) • May or may not require an agent
EDR Solutions
Commercial Open Source – Detection focused
• Carbon Black • Google Rapid Response
• CounterTack • Mozilla InvestiGator
• CrowdStrike • El Jefe
• Cybereason • Lima Charlie
• FireEye • OSQuery
• Tanium • Kind of:
• RSA - Sysmon
1 3 4 1 1 1 1
Current State Target State Desire State
D 3.1 D 3.2 D 3.3 D 3.4
25
References:
• SANS
• LogRythem
• Gartner
• SAMA
• ISO27001
• Lots of Research