Building a Cyber Security Operations Center - DefCamp 2015
Offered By: DefCamp via YouTube
Course Description
Overview
Explore the essential components and challenges of establishing a Cyber Security Operations Center in this DefCamp 2015 conference talk. Delve into key objectives, recovery times, compliance frameworks, and data aggregation strategies. Learn about critical success factors, change management processes, and infrastructure requirements. Discover the importance of asset repositories, threat cases, and offensive naming conventions. Gain insights into effective incident response techniques and methods for assessing security maturity. Enhance your understanding of cybersecurity operations and best practices in this comprehensive presentation from one of Central and Eastern Europe's most significant hacking and information security conferences.
Syllabus
Introduction
Challenges
Objectives
Recovery Times
Compliance Framework
Data aggregation
Key success factors
Change management
Processes
Data Recovery
Infrastructure
Asset Repository
Threat Cases
Offensive Naming Convention
Sock
Incident Response
Security Maturity
Taught by
DefCamp
Related Courses
The Model of Post-Quantum Signature Using Verkle Tree - DefCamp - 2022DefCamp via YouTube The Anatomy of Wiper Malware - DefCamp - 2022
DefCamp via YouTube Internet Balkanization in an Era of Military Conflict - Dan Demeter - DefCamp - 2022
DefCamp via YouTube How We Analyzed and Built an Exploit PoC for CVE-2022-24086, a Magento RCE - Catalin Filip - DefCamp - 2022
DefCamp via YouTube To Log, or Not to Log! That Is the Question - DefCamp - 2022
DefCamp via YouTube