Many companies have initiated IT security projects and operational protocols in order to meet compliance mandates for their industries. This is a good and necessary first step. However, in this era of complex cyberthreats, meeting the minimum standard is often not enough to protect against a security breach.

“Compliance is C-; it’s an absolute minimum passing grade,” according to G. Mark Hardy, president of the National Security Corporation. While compliance is a starting point, Hardy advised companies to organize for success via a security operations center (SOC). “An effective security operations center that is instrumented, with people specifically trained and empowered to act, will catch threats faster and narrow the window of opportunity for potential hackers.”

Watch the on-demand webinar to learn more: Are You Ready for a Security Operations Center?

In this short video, Hardy explains the advantages of an SOC and how the right tools and methodology can help improve your operational efficiency:

Even if you do not have a 50-person security staff, you can start small and achieve success that translates into positive business impact for your constituents. To hear more from G. Mark Hardy on how to fund, staff and operate an SOC, view our on-demand webinar “SOC It to Me: Are You Ready for a Security Operations Center?

more from Intelligence & Analytics

CISA Certification: What You Need to Know

The globally-recognized Certified Information Systems Auditor (CISA) certification shows knowledge of IT and auditing, security, governance, control and assurance to assess potential threats. As you can imagine, it’s very much in demand. It can also be confusing.  Is CISA Certification Related to the Cybersecurity and Infrastructure Security Agency? CISA, the certification, is related to CISA, the federal agency, right?  Wrong.…

Raspberry Robin and Dridex: Two Birds of a Feather

IBM Security Managed Detection and Response (MDR) observations coupled with IBM Security X-Force malware research sheds additional light on the mysterious objectives of the operators behind the Raspberry Robin worm. Based on a comparative analysis between a downloaded Raspberry Robin DLL and a Dridex malware loader, the results show that they are similar in structure and functionality. Thus, IBM Security…