The Modern Security Operations Center
Author: Joseph Muniz (Author)
Publisher finelybook 出版社: Addison-Wesley Professional
Edition 版本: 1st
Publication Date 出版日期: 2021-05-06
Language 语言: English
Print Length 页数: 752 pages
ISBN-10: 0135619858
ISBN-13: 9780135619858
Book Description
The Industry Standard, Vendor-Neutral Guide to Managing SOCs and Delivering SOC Services
This completely new, vendor-neutral guide brings together all the knowledge you need to build, maintain, and operate a modern Security Operations Center (SOC) and deliver security services as efficiently and cost-effectively as possible.
Leading security architect Joseph Muniz helps you assess current capabilities, align your SOC to your business, and plan a new SOC or evolve an existing one. He covers people, process, and technology; explores each key service handled by mature SOCs; and offers expert guidance for managing risk, vulnerabilities, and compliance. Throughout, hands-on examples show how advanced red and blue teams execute and defend against real-world exploits using tools like Kali Linux and Ansible. Muniz concludes by previewing the future of SOCs, including Secure Access Service Edge (SASE) cloud technologies and increasingly sophisticated automation.
This guide will be indispensable for everyone responsible for delivering security services―managers and cybersecurity professionals alike.
Address core business and operational requirements, including sponsorship, management, policies, procedures, workspaces, staffing, and technology
Identify, recruit, interview, onboard, and grow an outstanding SOC team
Thoughtfully decide what to outsource and what to insource
Collect, centralize, and use both internal data and external threat intelligence
Quickly and efficiently hunt threats, respond to incidents, and investigate artifacts
Reduce future risk by improving incident recovery and vulnerability management
Apply orchestration and automation effectively, without just throwing money at them
Position yourself today for emerging SOC technologies
From the Back Cover
- All you need to know to effectively provide comprehensive security services through a modern SOC ― whether you’re a manager, security professional, or network professional
- Covers the technical, people, process, and compliance issues required to make an SOC effective ― no matter whose technology you’re using
- Includes full chapters on data centralization, data orchestration, threat intelligence, threat hunting, and many other key topics
- By three internationally renowned security, SOC, and networking experts
About the Author
Joseph Muniz is an architect and security researcher in the Cisco Security Sales and Engineering Organization. He is driven by making the world a safer place through education and adversary research. Joseph has extensive experience in designing security solutions and architectures as a trusted advisor for top Fortune 500 corporations and the U.S. government.
Joseph is a researcher and industry thought leader. He speaks regularly at international conferences, writes for technical magazines, and is involved with developing training for various industry certifications. He invented the fictitious character of Emily Williams to create awareness around social engineering. Joseph runs The Security Blogger website, a popular resource for security and product implementation. He is the author and contributor of several publications including titles ranging from security best practices to exploitation tactics.
When Joseph is not using technology, you can find him on the fútbol (soccer) field or raising the next generation of hackers, also known as his children. Follow Joseph at https://www.thesecurityblogger.com and @SecureBlogger
相关文件下载地址
相关推荐
- Microsoft 365 Copilot At Work: Using AI to Get the Most from Your Business Data and Favorite Apps
- Real-World Edge Computing: Scale, secure, and succeed in the realm of edge computing with Open Horizon
- Salesforce DevOps for Architects: Discover tools and techniques to optimize the delivery of your Salesforce projects
- Segment Routing in MPLS Networks: Transition from traditional MPLS to SR-MPLS with TI-LFA FRR
- Unveiling NIST Cybersecurity Framework 2.0: Secure your organization with the practical applications of CSF
- Mastering DevOps on Microsoft Power Platform: Build, deploy, and secure low-code solutions on Power Platform using Azure DevOps and GitHub