The Security Operations Center (SOC) is intended to be the nexus of protection for the organization. There are many things it must do. This talk will depict a model for security operations and the data flow of threat hunting within the SOC. This includes: inputs, outputs, staff members and technology necessary to accomplish the often misconstrued task of threat hunting.
Chris Crowley (@CCrowMontance), Principal Instructor, SANS Institute
4 июл 2024