RSS feed Get our RSS feed

News by Topic

How To Build a SOC With Limited Resources


The purpose of this white paper is to show you how you can successfully build a SOC, even with limited resources. The paper first explains the basics of the Cyber Attack Lifecycle and the need to address it through the Threat Lifecycle Management framework. Next, the paper explains the basics of SOCs, providing details of what SOCs mean in terms of people, processes, and technology. Finally, the paper walks you through a methodology for building a SOC with limited resources, focusing on tactics to make your rollout smooth and successful. After reading this paper, you should be ready to start planning your own SOC.

Tags : reconnaissance, initial compromise, command control, lateral movement, target attainment, corruption
 Email this page
Published:  Sep 05, 2017
Length:  16
Type:  White Paper