How to Build a SOC for SCADA/ICS Environments

 

 

Modern threats are increasing in sophistication and evasiveness against Process Control Networks (PCN) at an astonishing speed. Organizations are facing a constant challenge to adopt modern techniques to proactively monitor the security posture within the SCADA infrastructure whilst keeping cyber attackers and threat actors at bay.

In this presentation, CISSP and Security Solutions Consultant Shah H. Sheikh covers the basics of building a SCADA Security Operations Center (SOC), with key responsibilities such as Incident Response Management, Vulnerability and Patch Management, Secure-by-design Architecture, Security Logging and Monitoring.  Shah will also discuss how such security domains drive accountability and act as a line of authority across the PCN.

 

Follow Jeff

Jeff Edwards

Jeff Edwards is an enterprise technology writer and analyst covering Identity Management, SIEM, Endpoint Protection, and Cybersecurity writ large.He holds a Bachelor of Arts Degree in Journalism from the University of Massachusetts Amherst, and previously worked as a reporter covering Boston City Hall.
Jeff Edwards
Follow Jeff

Leave a Reply

Your email address will not be published. Required fields are marked *