A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
ISDPodcast Button
RootSecure Button
Social-engineer-training Button
Irongeek Button

Web Hosting:
Dreamhost Logo
Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


How to create a one man SOC Derbycon 2012 (Hacking Illustrated Series InfoSec Tutorial Videos)

How to create a one man SOC
Derbycon 2012

Whether you have a one person IT department or a large Information Security department, it is important with the current threat landscape to have a Security Operations Center (SOC). You can build your own SOC that can centralize your security monitoring and lay the foundation for incident monitoring and response. This session will cover what is needed to stand up a SOC that fits your business size and needs, what to monitor, and how to report what you find.

Jamie Murdock

Jamie is a Senior Information Security Architect at Diebold. He has over 13 years of experience, specializing in security incident event monitoring, incident response, Security Operations, and disaster recovery/business resumption. He is responsible for the corporate intrusion detection environment and corporate and customer SEIM environments. Gamer/father/husband/Marine. Semper Fi
 

Back to Derbycon 2012 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2014, IronGeek
Louisville / Kentuckiana Information Security Enthusiast