![Exploring Information Security Archive 1 artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/0a/e3/29/0ae329a6-824b-e791-64ac-b689c563d1e9/mza_1630514793302750726.jpg/100x100bb.jpg)
How to build a SOC - Part 2
Exploring Information Security Archive 1
English - January 11, 2016 01:42 - 25 minutes - 28.8 MBTechnology Education How To Homepage Download Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed
Fellow co-host of the PVC Security podcast, Paul (@prjorgensen) spends most of his day thinking about socks. Once he's decided on a pair, he goes out into the world to help organizations build a SOC or security operations center. He's got extensive knowledge of how to put one together and that showed in the recording. For the first time in EIS history, we have a three part series.
In this SOC it to me edition of the Exploring Information Security Podcast, I talk with Paul Jorgensen of IBM to figure out how to build a SOC.
Fellow co-host of the PVC Security podcast, Paul (@prjorgensen) spends most of his day thinking about socks. Once he's decided on a pair, he goes out into the world to help organizations build a SOC or security operations center. He's got extensive knowledge of how to put one together and that showed in the recording. For the first time in EIS history, we have a three part series.
In part 1 we discuss:
How to quantify the value of a SOCThe first step in building a SOC