As a commitmenttoclosingthecybersecurityworkforcegapbycreatingmulti-domaincybertechnicians, ECCouncilpledges $3.5 milliontowardsCCTeducationandcertificationscholarshiptocertifyapproximately 10,000 cyberprofessionalsreadytocontributetotheindustry.
Soanotherareathatyouwanttolookatas a securityoperationsleaderisatsomepointtocreate a charterandwritedownyourroles, yourresponsibilities, andreallythelimitsofwhattheSOCcando.
Andthatcancover a lotofthings, andyouwantthattobeaniterativeand a learningor a livingdocument, andnotjustletitsiton a shelf.
So, youleveragethisworkyoudoas a leaderputtingthistogethertoprioritizewhatyouworkon, whetherit's addingnewcapabilitiestotheSOC, suchasdetectionengineering, orhowyourespond.
Soandin a morematureorganization, notsaying a largerorganization, again, thiscouldjustbe a fewpeople, youneedtostartincorporatingthreatintelligencetofocusthelimitedresourcesthatwehaveonthelargestthreatprofiles.
Soyoushouldhave a processofdoingthreathuntingagainstthatthreatintelligencedatatobetterunderstandandbuild a threatproductsoyouknowwhatyourenvironmentisandoryourcustomers.
Okay, I willtellyoulike I tellmystudentswhen I teachdifferentcourses.
Learnoneofthefollowinginanyorder.
LearnAzureSentinel, learnSplunk, learnElastic.
Learnoneofthemwellenoughtodoqueries, tobuild a dashboard, doenoughqualitativeanalysistobuild a representativedashboard.
Perfectexample I alsogiveisbuild a dashboardand, youknow, it's foryourcustomer, thisfictitiouscustomer, andhave a VMfireoffsomethingthatisorlookslikePSExec.
Can I see a sampleSOCplaybookand a sampleofSOCrunbook?
I unfortunatelydonothavethetimetoshowexamples.
Sothebasicdifferencebetween a playand a runbookandhowyouwouldwanttoconstructthemistheplaybookyouwanttobuildoutastheoverarchingresponsetohowyouhandle, let's say, just a campaign.