Sam Harris, Stratascale
Building a Modern SOC Requires Continuous Attack Surface Validation:
The Modern SOC requires continuous validation of the attack surface to understand what threats exist, how those threats change every day, and the impacts they may cause.
Protecting your enterprise from breaches and bad guys in the cloud era means staying several steps ahead. If your Security Operations Center (SOC) fails to keep up with changing technologies and tactics, your risks multiply significantly.
The enterprise SOC assumes responsibility for centralized, consolidated cybersecurity ranging from incident prevention through detection and response. Tasks typically focus on security monitoring as well as device management, threat intelligence, incident response, and training.
Enterprises have now added Attack Surface to their SOCs and are expanding that Attack Surface as fast rate forcing the SOC to know a wide range of technology, attacks, and prioritization strategies. In order for those SOCs to be successful they’ll need to ensure the data they receive about the Attack Surface is continuously validated to avoid falling into the rabbit hole.
Security Professional specializing in Vulnerability, Attack Surface, and Risk Management.
Responsible for the vision and development of service offerings to assist organizations in securing their Attack Surface. Fortune 500 Security Professional who assisted in developing an automated Vulnerability and Risk Management program for multi-national sites.
Practice Lead and Service Operations Manager of Security Operations for Managed Security Services provider.
Hear Sam May 10-11 2022 Register for Austin Cyber Show Zoom Events
Join US and Canada cyber community members at the inaugural Austin Cyber Show Conference at Concordia University Texas, May 10-11. During the two-day cyber defense conference, participants can engage in discussions with peer leaders and industry experts on the cyber risks and challenges that businesses, leaders, developers, educators, and students face each day. Attendees will walk away with new insight and leadership lessons learned to defend against ransomware, phishing, and data exfiltration attacks. Five Cyber-By-Fire Skill Certificates are available to earn at the event and via Zoom Events online for 30 days afterward.