You are reading get started | #SOC_Superposition interview questions

Why Quantum Cybersecurity Skills drive #SOCsuperposition interviews?

One of Quantum Cybersecurity Skills goals is to build a global community of Security Operations (SOC/MSSP/CSIRT/CERT) and Quantum Experts, Leaders, Architects and enthusiasts who recognize the need to drive new solutions, thinking and nurturing the new skills set aiming to achieve effective organizational resilience and create a cyber resilient future.

feedback Tim.jpg

What is #SOCsuperposition interview?

This is a series of videos and blogs which focuses on Security Operations best practices and future readiness. It’s all about your opinions based on your expertise. There is no right or wrong answer, just different perspectives and food for thought.

What interview for #SOCsuperposition is NOT?

  • A Sales pitch of any kind

  • A direct report on what initiatives your current organisation may be driving

Where the interview will be published?

Proposed questions for Security Leaders

1. One of the challenges many Security Leaders face is finding the right cybersecurity talent and retention. What do you do to enhance Security Operations employee experience, motivate and nurture a future-ready Security Operations team?

 

2. How do you quantify the value of security-aware culture?

 

3. What is your advice on the effective management and continuous training of a dispersed Incident Response Plan stakeholders?

 

4. Automation, Machine Learning (ML), Artificial Intelligence (AI) technologies are being adopted within the Security Operations environment with more confidence. In your opinion, how will the role and importance of human experts change over the next three to five years?

 

5. What technical and non-technical skills do you consider important to ensure effective cyber resilience and defence of your organization?

 

6. A SANS Institute study suggests that the top barrier to Security Operations excellence is staff availability. What status quo would you challenge (or have challenged) to help increase Security Operations agility and efficiency in short-term and long-term?

 

7. A Ponemon Institute Report suggests that cyber crime drains $11.7 million per business annually, up 62 percent in five years. What Security Operations metrics do you really care about that also help engage Senior Leadership including ones at the Board Level? Please name 2-3.

8. Incident Response Life Cycle is arguably a tactical component of the security program and the success of your IR team depends on many factors. Which factors would you list in a successful recipe and why, based on your experience?

 

9. Organizations need a dynamic approach to envision the technology driven future and lead SOC transformation. What does SOC optimization mean to you? Where does it start and end?

10. How would you be able to quantify the business value of optimized SOC vs non-optimized SOC? (KPIs Metrics, Costs, etc.)

Marius.png
Elad feedback.jpg
Dragomir.png
oliver feedback.jpg

Other Proposed Topics by the Speakers

  • Security architecture and Threat Monitoring - today's best practices vs how quantum computing could influence it?

  • 'Security By Design' best practices and challenges

  • Risk Awareness - balancing between business needs and cyber security objectives to achieve appropriate security

  • Cyber secure vs compliance

  • Intelligence-Driven Incident Response (F3EAD cycle)

  • SecOps: best business practice to reduce alert-fatigue

  • SecOps sustainability through tiering key assets that require protection

  • Security visibility | Security Validation | Security Certificate | Proactive Security Testing - what is the business value and potential risks of such approach?

  • Artificial Intelligence (AI) didn't arrive yet, it's just a more optimized machine learning (ML).

  • AI: How far it can bring us and AI algorithm integrity challenge.

  • Quantum Computing Readiness: technical and non-technical skills

  • How Quantum Computing could impact cybersecurity from resilience and defence point of view.

  • Industrial Cyber Security: the challenges and what we should be doing differently.