This is the definitive, vendor-neutral guide to building, maintaining, and operating a modern Security Operations Center (SOC). The authors introduce the SOC as a service provider, and show how to use your SOC to integrate and transform existing security practices, making them far more effective. This book covers:    How SOCs have evolved, and the key considerations in deploying them today   Key services SOCs can deliver, including organizational risk management, threat modeling, vulnerability assessment, incident response, ...
				Read More
			
				This is the definitive, vendor-neutral guide to building, maintaining, and operating a modern Security Operations Center (SOC). The authors introduce the SOC as a service provider, and show how to use your SOC to integrate and transform existing security practices, making them far more effective. This book covers:    How SOCs have evolved, and the key considerations in deploying them today   Key services SOCs can deliver, including organizational risk management, threat modeling, vulnerability assessment, incident response, investigation, forensics, and compliance   People and process issues, including training, career development, job rotation, and hiring   Centralizing and managing security data more effectively   Threat intelligence and threat hunting   Incident response, recovery, and vulnerability management   Using data orchestration and playbooks to automate and control the response to any situation   Advanced tools, including SIEM 2.0   The future of SOCs, including AI-Assisted SOCs, machine learning, and training models
				Read Less