You are reading community | library of security and quantum best practices
Library of Security Best Practices
#SOCsuperposition Video Interviews with Security Leaders and Quantum Experts
We have aligned topics covered by the Industry Voice to Quantum Cybersecurity Skills approach. We believe that security is not just technical matters, therefore, it needs to be equally woven into all business verticals: Operational, Tactical and Strategic. Our experience shows that organizations are primarily exercising security at Operational level (technology, data). There is a great opportunity of security optimization at Tactical and Strategical layers. Equally aligned security at all business verticals positively impacts business agility and growth.

Fig. 1. Quantum Cybersecurity Skills approach: security at all business verticals. Learn more.

Fig. 2. Quantum Cybersecurity Skills approach: security sources and how they tie into each business vertical. Learn more.
Industry Voice: The Latest #SOCsuperposition Interviews
with Security Leaders & Quantum Experts
If you wish to take part in #SOCoptimization video interview, please click here.
SECURITY AT STRATEGIC LAYER
People, Actionable Information, Business Alignment
People incl. Decision Making, Careers, Skills, Upskilling
-
Female Cybersecurity Leaders: support, challenges, career growth > Clodagh Durkan
-
Retention of security talent and attracting top caliber talent > Guillaume Daleux Elad Ortiz Murena Lavin
-
Security skills (technical and non-technical) - part of agile security > Charles Ibrahim Elad Ortiz Oliver Rochford
-
Quantum skills and which roles in cybersecurity team are upskilling with quantum computing knowledge > Kareem H. El-safty John Barnes
-
Role and importance of human experts in automated SOC environment > Charles Ibrahim Oliver Rochford
Alignment to Business incl. Business Continuity, Risk Quantification, Cyber Resilience & Defense
-
Business Continuity success factors, challenges, best business practice > Tony Ridley Kandice Callender
-
Cyber Risk Quantification > Tim D Williams Clodagh Durkan Michael Fontner
-
Risk Awareness - balancing between business needs and cyber security objectives to achieve appropriate security > Dragomir Vatkov
-
SOC: is it a cost or an investment? > Guillaume Daleux Elad Ortiz Oliver Rochford
-
SOC value to business (metrics) > Murena Lavin Elad Ortiz
-
How Quantum Computing could impact cybersecurity from resilience and defense point of view > Kareem H. El-safty Sudeept Maharana
-
Cyber Resilience optimization > Andreas von Grebmer Tony Ridley Elad Ortiz Clodagh Durkan
-
Quantifying security-aware culture > Guillaume Daleux
Security Architecture & Design
-
Security architecture > Tim D Williams
-
Security-By-Design best practices and challenges > Dragomir Vatkov
SECURITY AT TACTICAL LAYER
Processes, Compliance, Security Posture
Processes
-
Threat Monitoring > Tim D Williams
-
Incident Response monitoring round the clock best practices > Aidan McLaughlin Prabhu Kiran Veesam
-
Incident Response Life Cycle > Aidan McLaughlin Ahmed Afifi Murena Lavin
-
SecOps sustainability through tiering key assets that require protection > Aidan McLaughlin Marius Poskus
-
Industrial Cyber Security: the challenges and what we should be doing differently > Gloria Cedillo
Compliance
-
Cyber secure vs compliance > Dragomir Vatkov
-
ISO 2700x compliance best practice > Prabhu Kiran Veesam
Security Visibility incl. Security Transparency, Security Posture, Security Tactics, Security Maturity
-
Security monitoring: Our Global SOC Survey 2021 (results captured so far) suggests that one of the great challenges by organizations globally is achieving continuous corporate-wide cybersecurity visibility including people, technology, processes and business alignment. Discussing how it affects security monitoring approach / strategy and discussing best practices > Coming soon!
-
Security visibility | Integrated security approach > Andreas von Grebmer Elad Ortiz
-
APTs: Advanced persistent threats (APTs) are amongst the most difficult cyber threats to defend against. APTs are sneaky and stealth, slipping into your network quietly and remaining there undetected for days, weeks or months while hackers gather sensitive information or mess with the integrity of your logs (CIA) or spread more malware. QCS Global SOC Survey 2021 (data collected so far) indicates that over 1/3 of global organizations feel their SOC / MDR would benefit from an efficacy boost (fine-tunning). Putting this capability challenge of SOC into perspective of APTs, we are discussing tactics that could help to become more effective defending against APTs > Coming soon!
-
Security Maturity > Tony Ridley
Continuous Improvement
-
Continuous Improvement for data security best practice > Prabhu Kiran Veesam
-
Security Optimization > Ahmed Afifi Guillaume Daleux
SECURITY AT OPERATIONAL (TECHNICAL) LAYER
Technology (and Assets), Data Management
Technology
-
Artificial Intelligence (AI) > Charles Ibrahim Ahmed Afifi Tim D Williams Jay Jay Davey
-
AI: How far it can bring us and AI algorithm integrity challenge > Michael Fontner
-
Quantum ML (Machine Learning) > Sudeept Maharana
Data Management incl. Data Quality
-
SecOps: best business practice to reduce alert-fatigue > Marius Poskus
-
Intelligence-Driven Incident Response (F3EAD cycle) > Marius Poskus