The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
The idea of operations centers has been around as far back as 5,000 B.C. This show covers the history of how we got from general purpose operations centers to the security operations centers today, the limitations of those centers, and what we need to do as a community make them more useful in our infosec program.
Four members of the CyberWire’s Hash Table of experts:
Don Welch: Interim CIO of Penn State University
Helen Patton: CISO for Ohio State University
Bob Turner: CISO for the University of Wisconsin at Madison
Kevin Ford: CISO for the State of North Dakota
discuss SOC Operations in terms of intrusion kills chains, defensive adversary campaigns, insider threats, cyber threat intelligence, zero trust, SOC automation, and SOC analyst skill sets.