YoVDO

Running a Security Operations Center - Challenges, Solutions and Key Learnings

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Network Security Courses Risk Management Courses Regulatory Compliance Courses Security Operations Centers Courses Threat Hunting Courses

Course Description

Overview

Explore the challenges, solutions, and key learnings from operationalizing a Security Operations Center in this 47-minute Black Hat conference talk. Gain insights into increasing threat hunting coverage for on-premise and cloud environments, implementing behavioral analytics for anomaly detection, and enhancing SOC capabilities for rapid product deployment and validation. Discover strategies for addressing operational issues, understanding risk tolerance, ensuring regulatory compliance, and managing various domains of risk. Learn about decryption techniques, the importance of metadata analysis, targeted inspection methods, and the integration of inline solutions. Examine the relationship between network and security operations, and understand the role of automation in modern SOC management.

Syllabus

Introduction
Risk Tolerance
Regulation Compliance
Capabilities
Domains of Risk
Challenges
The Problem
The Solution
Decrypting
Metadata
Network metadata
Targeted inspection
Inline solutions
Network vs Security
Automation


Taught by

Black Hat

Related Courses

Security Principles
(ISC)² via Coursera
A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera
FinTech for Finance and Business Leaders
ACCA via edX
Access Control Concepts
(ISC)² via Coursera
Access Controls
(ISC)² via Coursera