{"title":"CyberSoc Implementation Plan","authors":"Mário Saraiva, N. Coelho","doi":"10.1109/ISDFS55398.2022.9800819","DOIUrl":null,"url":null,"abstract":"Cybersecurity operations centers (CyberSoc) should have all they need to defend the ever-changing information technology (IT) company today. This comprises a diverse set of advanced detection and prevention tools, a virtual sea of cyber intelligence reporting, and access to a rapidly growing pool of experienced IT experts. Despite this, most CyberSoc fail to keep the enemy (even the most inexperienced) out of the enterprise. The odds are stacked heavily against the defense. While the attacker only needs to identify one way in, the defenders must protect all entry points, restrict and analyze damage, and locate and eliminate adversary points of presence in business systems. Furthermore, cybersecurity professionals are increasingly aware that capable adversaries may and will get permanent access to company networks. As if the situation wasn’t horrible enough, we are frequently our own worst enemies. Many CyberSocs devote more time and effort to dealing with politics and human concerns than to detecting and responding to cyber threats. All too frequently, CyberSocs are established and run with a sole focus on technology, neglecting to address people and process challenges. The major goal of this work is to provide as a guide for when a CyberSoc implementation is required.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISDFS55398.2022.9800819","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Cybersecurity operations centers (CyberSoc) should have all they need to defend the ever-changing information technology (IT) company today. This comprises a diverse set of advanced detection and prevention tools, a virtual sea of cyber intelligence reporting, and access to a rapidly growing pool of experienced IT experts. Despite this, most CyberSoc fail to keep the enemy (even the most inexperienced) out of the enterprise. The odds are stacked heavily against the defense. While the attacker only needs to identify one way in, the defenders must protect all entry points, restrict and analyze damage, and locate and eliminate adversary points of presence in business systems. Furthermore, cybersecurity professionals are increasingly aware that capable adversaries may and will get permanent access to company networks. As if the situation wasn’t horrible enough, we are frequently our own worst enemies. Many CyberSocs devote more time and effort to dealing with politics and human concerns than to detecting and responding to cyber threats. All too frequently, CyberSocs are established and run with a sole focus on technology, neglecting to address people and process challenges. The major goal of this work is to provide as a guide for when a CyberSoc implementation is required.