ISMS

Combat Insider Threats with your SIEM

Monitoring privileged access from your SOC is the best way to detect potential insider threats.  Recently, several news stories have shown how important it is to have the tools in place to manage the threat of rogue employees with too many privileges. Facebook, for example, had to fire multiple employees for, “snooping on users,” according to one story reported on Motherboard[1].

Read More

Choosing a SOC Service Model: The Key Considerations

What factors do CISOs take into account when choosing a SOC service model?  Information security is high on the agenda of every UK and Australian board these days, especially given the changes in privacy legislation and mandatory data breach notification. However, security is a highly complex issue and requires a deep conviction throughout the business to be successful. 

Read More

Three Levels of SOC Maturity: Steps for Continual Service Improvement

Those who run security operations centres (SOC) acknowledge that the more automation built into the service, the more likely analysts will have the time to hunt for threats. Yet, the path to SOC maturity isn’t one that most SOCs follow. This blog looks at three levels of maturity that SOCs can pass through before being properly integrated with the rest of the business’s service management processes.

Read More

ISMS Essentials: The Dark Side of Shadow IT

This is a short post looking at the challenges of adopting unknown software; challenges that include a lack of change control, IT security and ISMS involvement, as well as the increased chance of cyber-attack and loss.

We will look at network based shadow IT, the advent of shadow IT via the Cloud and tips to tackle the threat.

Read More
1 2 3