What separates a highly effective SOC from a poor-performing SOC?

In this three-part conversation, we will discuss exactly that: the technology, the humans, and the synergistic relationship between the two. 

Together, with Devo, we explore the tale of Two SOCs: what defines success and what drives performance—plus what doesn’t.

Based on the results of an independent survey of IT and IT security practitioners, the second annual report looks at the latest trends in security operations centers (SOC), both positive and negative. The report presents an unvarnished view of the current state of SOC performance and effectiveness. Based on responses from people with first-hand knowledge of SOC operations, identifies areas of change from the prior year’s survey and highlight the challenges that continue to hinder many SOCs from achieving their performance goals.

The survey posed a broad range of questions designed to elicit insights into several key aspects of SOC operations, including:

• The perceived value of SOCs to organizations

• Areas of effectiveness and ineffectiveness

• The ongoing challenge of SOC analyst burnout, its causes, and effects

In this episode, we look specifically at the role of technology in driving performance in a successful SOC.

Technology plays a critical role in building and running a security operations center by helping humans in the SOC be proactive and productive and creating a high-performing system customized for defined business objectives.

Technology can’t function independently, and the SOC analysts can’t do their job without technology. With this in mind, we are left with what could be a tough question for many to answer if not carefully thought through: Is technology here to help humans, or are humans here to use technology to help themselves?

Hear what Tunde and Jason have to say in this experience-driven, data-supported, actionable conversation.

"I think we'll always have the eyes-on-glass decision-making process because our adversaries are always changing; the threat landscape and the defense are always changing. So there's never going to be 100% automated from my perspective."—Tunde Oni-Daniel

"What we start to automate away tends to paint a picture of something to come that requires, again, that human element-the human triage-to understand exactly what the TTP is, what the tactic used exactly is that the attacker is trying to do."—Jason Mical

(This contains promotional content: learn more)

Guest(s)
Tunde Oni-Daniel, VP/SMD Head of Security Architecture, Engineering and Operations, OneMain Financial

Jason Mical, Cyber Security Evangelist, Devo

Resources
To download and read the Tale of Two SOCs Report, visit https://itspm.ag/2YzLeFA

Catch all of the episodes in this series and access even more valuable resources by visiting www.itspmagazine.com/their-stories/a-tale-of-2-socs-technology-people-business-for-the-win-a-three-chapter-story-with-devo

Learn more about their company and their offering: https://itspm.ag/itspdvweb

Are you interested in telling your story?
https://www.itspmagazine.com/telling-your-story