A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Measuring the Maturity of Your Security Operations Capabilities - Clarke Cummings (Central Ohio Infosec Summit 2015) (Hacking Illustrated Series InfoSec Tutorial Videos)

Measuring the Maturity of Your Security Operations Capabilities
Clarke Cummings

GRC - Session #2 - Clarke Cummings The paradigm of security is shifting away from security and towards a more complete approach. Where once we were the security M&M, with a crunchy, defensible outside and a deliciously insecure middle; then we focused on securing the entire enterprise, not just the edge; and now we are finally starting to see organizations focus on security, observation/detection, and resiliency. This shift puts a greater emphasis on the security operations team. It is important to measure your team's effectiveness and work towards developing and maturing that capability. Ideas for generating a roadmap for maturing the SOC will be discussed.

Bio: Clarke is an information security professional focused on cyber risk and security operations. Clarke helps to deliver cyber security operations expertise to many customers in healthcare, financial services, retail and other industries. Clarke has 20 years of experience helping organizations solve complex technical and business related problems. For the most of that time, Clarke has worked exclusively within the information security field. Many problems Clarke has helped to resolve have been focused on helping customers understand the risk they faced and how to deal with identifying the most important risks and working to close those risk gaps. Clarke received his CISSP in 2001, and has a Masters Degree of Information Assurance from Norwich University.

Back to Central Ohio Infosec Summit 2015 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2016, IronGeek
Louisville / Kentuckiana Information Security Enthusiast