Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
    • By Category
      • AI/Hyperautomation
      • Cloud/Cloud Wars
      • Cybersecurity
      • Data
    • By Interest
      • Leadership
      • Office of the CFO
      • Partners Ecosystem
      • Sustainability
    • By Industry
      • Financial Services
      • Healthcare
      • Manufacturing
      • Retail
    • By Type
      • Guidebooks
      • Digital Summits
      • Practitioner Roundtables
      • Practitioner Playlists
    • By Language
      • Español
  • Vendor Shortlists
    • All Vendors
    • AI/Hyperautomation
    • Cloud
    • Cybersecurity
    • Data
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
Twitter Instagram
  • CIO Summit
  • Summit NA
  • Dynamics Communities
Twitter LinkedIn
Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
        • By Category
          • AI/Hyperautomation
          • Cloud/Cloud Wars
          • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
          • Data
        • By Interest
          • Leadership
          • Office of the CFO
          • Partners Ecosystem
          • Sustainability
        • By Industry
          • Financial Services
          • Healthcare
          • Manufacturing
          • Retail
        • By Type
          • Guidebooks
          • Digital Summits
          • Practitioner Roundtables
          • Practitioner Playlists
        • By Language
          • Español
  • Vendor Shortlists
    • All Vendors
    • AI/Hyperautomation
    • Cloud
    • Cybersecurity
    • Data
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
    • Login / Register
Acceleration Economy
    • Login / Register
Home » How the SOC Is Shifting With the Rapidly Evolving Cybersecurity Field
Cybersecurity as a Business Enabler

How the SOC Is Shifting With the Rapidly Evolving Cybersecurity Field

Robert WoodBy Robert WoodJuly 1, 2022Updated:July 1, 20224 Mins Read
Facebook Twitter LinkedIn Email
SOC Cybersecurity
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

For many years now, the Security Operations Center (SOC) has been a staple for security teams. It’s an essential part of ensuring that alerts are properly investigated to determine and manage the risk around possible security incidents. Naturally, the SOC is changing as the cybersecurity field changes. Another big driver, though, is how organizations’ reliance on and perceptions of cybersecurity teams are changing.

SOC in a Remote World

The traditional SOC came with visualizations of large rooms filled with monitors of streaming data, maps, and traffic flows. It was a command center, buzzing with activity meant to protect an organization from active threats. The Covid-19 pandemic totally upended this approach, pushing everyone out of the office where they are working remotely.

This shift has instigated a change in tooling and the way data is accessed within the SOC, moving away from locked-down internal networks and layers of firewalls. The same tools that enable SOC members to collaborate and access data more fluidly also open up opportunities to engage a broader workforce without geographic restrictions. This is also an enabler to facilitate faster or more efficient production of value.

SOC + DevSecOps

Recent years have seen an explosion of interest and engagement around DevSecOps, the work to unify across development, security, and operations teams. There is a natural feedback loop between development teams and a SOC. Collaboration needs to be tight between these two groups to ensure that:

  • Alerts are set up for the right things for the technology, not just relying on some generic list of issues to alert on.
  • The SOC understands how to contextualize and properly investigate the alerts.
  • The development teams understand how to respond to and handle the issues that happen on their systems as well as how to collaborate with the SOC for added support or investigations.

The last bullet is about, in my mind, reinforcing a mindset of ownership over security outcomes and collaborating to enhance that capability, not absolve oneself of it.

Delegated Responsibilities

Related to the above, development teams are taking more ownership over the health of the services they’re building. The explosion of services like New Relic, DataDog, and SysDig is enabling teams to own their service’s uptime, the drift, and the security posture. I believe that the SOC needs to adapt the way they manage their data, the accessibility to it, and the comfort level with letting others in. When the SOC lets other teams in and delegates some parts of its responsibility to other teams, trust is built and speed of delivery across the board is enabled.

Rapid Response and the Role of Automation

The SOC received a surge of automation support with the introduction of SOAR tooling. This class of tooling allowed teams to more seamlessly automate team workflows, connect tools together, and test enhancement ideas. I believe that an integrated SOC is necessary in this world. There are no silver bullet solutions or threat actors engaged across such a broad spectrum of technologies within our environments.

Automation and SOAR investments also enable the SOC to expand its purview of responsibilities. The SOC normally operates in the detection and response domains (using the NIST CSF framework). Assembling automated playbooks allows it to operate in the protection or recovery domains as well.

Here’s a scenario. Consider a deception platform (Acalvio) connected with EDR (Crowdstrike) that triggers a ransomware attack. It initiates an event in IDM (Okta) to lock a user account or device management solution to lock or quarantine a device during an investigation.

Codifying attack vectors through SOAR response can be a powerful way to engage the SOC outside of the normal lanes of responsibility.

Concluding Thoughts

The SOC has historically operated as a detection and response function within the security team. The way that data and collaboration tools, cross-team engagement, and SOAR tools are improving is expanding the how and where that a SOC can add value to an organization.

I encourage all security leaders to be thinking about their SOC, not as something they can simply outsource and put in a box. Rather, think of how they can take a group of people who can engage across an organization to drive enhancements in event-driven response to security issues.


Want more cybersecurity insights? Subscribe to the Cybersecurity as a Business Enabler channel:

Acceleration Economy Cybersecurity

automation Cybersecurity devsecops remote work
Share. Facebook Twitter LinkedIn Email
Analystuser

Robert Wood

CISO
Executive Branch Agency

Areas of Expertise
  • Cybersecurity

Robert Wood is an Acceleration Economy Analyst focusing on Cybersecurity. He has led the development of multiple cybersecurity programs from the ground up at startups across the healthcare, cyber security, and digital marketing industries. Between experience with startups and application security consulting he has both leadership and hands on experience across technical domains such as the cloud, containers, DevSecOps, quantitative risk assessments, and more. Robert has a deep interest in the soft skills side of cybersecurity leadership, workforce development, communication and budget and strategy alignment. He is currently a Federal Civilian for an Executive Branch Agency and his views are his own, not representing that of the U.S. Government or any agency.

  Contact Robert Wood ...

Related Posts

Why Cybersecurity Leaders Need to Know the CISA Zero Trust Maturity Model

March 30, 2023

Generative AI Digital Summit

March 30, 2023

How Compliance and Multi-Cloud Impact Cybersecurity for Data Stored in the Cloud

March 30, 2023

How One Medical’s Patient-Centric Healthcare Model Led to Amazon Partnership

March 30, 2023
Add A Comment

Comments are closed.

Recent Posts
  • Why Cybersecurity Leaders Need to Know the CISA Zero Trust Maturity Model
  • Let’s Talk Transformation | Strategy
  • How Informatica Unlocks Digital Transformation With AI-Powered Data Management Platform
  • How ChaptGPT Plugins Create New AI Value, Including Real-Time Information
  • How to Prioritize IT Projects and Explain Their Value to the C-Suite, Board, and Business Units

  • 3X a week
  • Analyst Videos, Articles & Playlists
  • Exclusive Digital Business Content
This field is for validation purposes and should be left unchanged.
Most Popular Guidebooks

Securing Multi-Cloud Ecosystems

March 24, 2023

Securing Software-as-a-Service Applications

March 1, 2023

Retail Innovation With AI, Data, and Cybersecurity

March 1, 2023

Cloud Data Strategy, Analytics, and Governance

February 27, 2023

Advertisement
Acceleration Economy
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Advertising Opportunities
© 2023 Acceleration Economy.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?

Connect with

Login with Google Login with Windowslive

Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.