EXECUTIVE SUMMARY “Use cases are the core of security monitoring activities. A structured process to identify, prioritize, implement, and maintain use cases allows organizations to align...
Category: SIEM
CISO2CISO Notepad Series Last Article Publication Security Operations Centers (SOCs) SIEM SOC User most voted post
A Complete Guide to Modernizing your Security Operations Centers (SOCs) by Microsoft and CyberProof
INTRODUCTIONHaving a security operations center (SOC) is no longer a privilege of large organizations. With growing cyber attacks and a changing technology landscape, all companies are...
CISO2CISO Notepad Series CISO2CISO ToolBox Series Last Article Publication SIEM SOC User most voted post
Undestanding the Open Cybersecurity Schema Framework by Paul Agbabian.
Introduction to the Framework and Schema This document describes the Open Cybersecurity Schema Framework (OCSF) and its taxonomy,including the core cybersecurity event schema built with the...
Advisor Most Voted Post CISO2CISO Notepad Series CISO2CISO ToolBox Series SIEM SOC TOP Featured Post User most voted post
81 Siem Very important Use Cases for your SOC by SPLUNK
Splunk Use Cases Tags: Splunk 1- Windows Audit Log Tampering Check for any tampering done to Windows audit logs. 2- Finding Large Web Uploads Find large file...
Threat Hunting Introduction by Joas Antonio
What is Threat Hunting? – A successful threat hunting program is based on an environment’s data fertility. In other words, anorganization must first have an enterprise...
How to design your Security Operations Center (SOC) to work smarter, not harder.
INTRODUCTIONToday’s Major Security Operations Center Challenges In today’s digital economy, data isn’t just a means to create value, it has value itself. If banks were the...
ciso2ciso notepad – gartner blog – Use the Gartner SOC HIT Model
By Pete Shoard | October 21, 2021 | 0 CommentsSecurity Operations The Gartner Security Operations Centre (SOC) Hybrid-Internal-Tiered (HIT) Model is something we have been working on for a while. It...
A Guide to DevSecOps Tools and Continuous Security For an Enterprise by Navdeep Sing gill
A Guide to DevSecOps Tools and Continuous Security For an Enterprise by Navdeep Singh Gill | 27 October 2020 Source: https://www.xenonstack.com/blog/devsecops-tools Table of Contents Introduction to DevSecOps Top...