top of page

You are reading community | library of security and quantum best practices

Library of Security Best Practices

#SOCsuperposition Video Interviews with Security Leaders and Quantum Experts

We have aligned topics covered by the Industry Voice to Quantum Cybersecurity Skills approach. We believe that security is not just technical matters, therefore, it needs to be equally woven into all business verticals: Operational, Tactical and Strategic. Our experience shows that organizations are primarily exercising security at Operational level (technology, data). There is a great opportunity of security optimization at Tactical and Strategical layers. Equally aligned security at all business verticals positively impacts business agility and growth. 

Untitled.jpg

Fig. 1. Quantum Cybersecurity Skills approach: security at all business verticals. Learn more.

scope.png

Fig. 2. Quantum Cybersecurity Skills approach: security sources and how they tie into each business vertical. Learn more.

Industry Voice: The Latest #SOCsuperposition Interviews
with Security Leaders & Quantum Experts

If you wish to take part in #SOCoptimization video interview, please click here.

SECURITY AT STRATEGIC LAYER

People, Actionable Information, Business Alignment

People incl. Decision Making, Careers, Skills, Upskilling

Alignment to Business incl. Business Continuity​, Risk Quantification, Cyber Resilience & Defense

Security Architecture & Design

SECURITY AT TACTICAL LAYER

Processes, Compliance, Security Posture

Processes

Compliance

Security Visibility incl. Security Transparency, Security Posture, Security Tactics, Security Maturity

  • Security monitoring: Our Global SOC Survey 2021 (results captured so far) suggests that one of the great challenges by organizations globally is achieving continuous corporate-wide cybersecurity visibility including people, technology, processes and business alignment. Discussing how it affects security monitoring approach / strategy and discussing best practices > Coming soon!

  • Security visibility | Integrated security approach > Andreas von Grebmer Elad Ortiz

  • APTs: Advanced persistent threats (APTs) are amongst the most difficult cyber threats to defend against. APTs are sneaky and stealth, slipping into your network quietly and remaining there undetected for days, weeks or months while hackers gather sensitive information or mess with the integrity of your logs (CIA) or spread more malware. QCS Global SOC Survey 2021 (data collected so far) indicates that over 1/3 of global organizations feel their SOC / MDR would benefit from an efficacy boost (fine-tunning). Putting this capability challenge of SOC into perspective of APTs, we are discussing tactics that could help to become more effective defending against APTs > Coming soon!

  • Security Maturity > Tony Ridley

Continuous Improvement

 

SECURITY AT OPERATIONAL (TECHNICAL) LAYER

Technology (and Assets), Data Management

Technology

 

Data Management incl. Data Quality

  • SecOps: best business practice to reduce alert-fatigue > Marius Poskus 

  • Intelligence-Driven Incident Response (F3EAD cycle) > Marius Poskus ​​​

bottom of page