

Strategy 11: Turn up the Volume by Expanding SOC Functionality
15 snips Jul 18, 2023
This podcast covers topics such as threat hunting, red and purple teaming, breach and attack simulation, tabletop exercises, cyber deception, and expanding SOC functionality. It emphasizes the importance of proactive approaches in cybersecurity, the value of documentation and processes, and the challenges and considerations in expanding SOC functionality. The speakers also discuss the benefits of threat hunting and red teaming, different testing methodologies for evaluating SOC effectiveness, the importance of tabletop exercises for incident response, and the concept of deception in cybersecurity.
AI Snips
Chapters
Transcript
Episode notes
Start Threat Hunting Early
- Start threat hunting early with manageable, hypothesis-driven exercises.
- Ensure analysts have dedicated time and resources, avoiding constant incident response interruptions.
Hunting Beyond Automation
- Effective threat hunting requires automation to handle routine alerts.
- Human hunters focus on value-added investigations beyond what technology can detect.
Pair Analysts for Hunting
- Pair new and experienced analysts for threat hunting.
- Leverage diverse skills and knowledge to enhance hunt effectiveness and reduce loneliness.