Peer Reviewed

Security Transformation: SOC Programme Management

This study discusses the different types of activities that must occur for a successful security operations centre (SOC) transformation programme to take place. It establishes how the security programme can support business goals using the well-known Sherwood Applied Business Security Architecture-certified framework to scope the initial requirements to help deliver security services with regard to people, process and technology, ensuring the implementation of the security operation centre is achieved successfully. This study uses the example of the creation of a SOC to discuss how transformational requirements can be clarified using the results of a gap analysis to create a tracking document to ensure that cyber tools are correctly on-boarded when formulating the SOC. This study makes three recommendations that should be acted on by the end of the transformation programme for a successful SOC to be implemented.

Go to the profile of Rimesh Patel
Dec 19, 2016

Please sign in or register for FREE

Register to E&T Cyber Security Hub

E&T Cyber Security Hub brings together engineers and cyber security specialists to share practical know-how. With content created ‘by engineers, for engineers,’ it provides peer-reviewed technical information, real-world insights, lessons learnt and case studies, as well as tools for networking and knowledge-sharing, profiles of experts and the opportunity for companies to showcase their expertise.


No comments yet.