As security threats  develop new capabilities, there comes a need for organizations to setup a Safety Operations Center (SOC, pronounced as sock).  Counting on primary safety solutions which includes firewalls and anti-virus software is not sufficient. Cyber protection requires layers of defenses, similar to how a financial institution protects valuables with a safety method that includes cameras, guards, safes, and different measures beyond locking the the front door.

Layering cyber safety solutions requires anyone to be chargeable for permitting and retaining security, which ends up in the demand for a SOC. The most important aspect in starting a conversation for a SOC is justifying the cost to those who do not understand the severity of the issue and the need to be on the offensive rather than take to defensive measures with regards to security.

As per the finding from Verizon, “In 60% of cases, attackers are able to compromise an organization within minutes,” and “75% of attacks spread from Victim 0 to Victim 1 within one day (24 hours).” Reaction to a breach after harm has been done will likely lead to an exceptionally higher cost as has been proven in such breaches in the past.  Thus, showcasing a few facts breach examples from DataLossDB will be helpful in pushing the agenda for a SOC.

To Justify setting up a SOC the following questions may be pertinent in answering funding requirements:

  • How are you going to detect a breach
  • How do you decide the severity of the breach?
  • What is the effect of the breach on the company?
  • Who’s responsible for detecting and reacting to a breach?
  • Who have to be informed or concerned, and when do you cope with a breach as soon as it’s detected?
  • How and when the breach be discussed internally or externally?

These questions are designed to make the organization’s leadership reflect on the impact of a  breach and judge their current cyber protection competencies. Many corporations discover that they need to develop a higher incident-reaction plan—one which calls for a group inside the organization to be accountable for it. That group should be the SOC.


About The Author

"Founded in July, 2016, is a cyber security blog that covers important security issues affecting common users, industry and governments. It aims to create awareness among its readers about malware, hacking, encryption, identity theft, privacy, etc and also offer solutions to protect themselves from such attacks"


  1. hey there and thank you for your info – I’ve certainly picked up
    anything new from right here. I did however expertise
    some technical points using this web site, as I experienced to reload
    the site lots of times previous to I could get it
    to load properly. I had been wondering if your hosting is OK?
    Not that I am complaining, but slow loading instances times will very frequently affect your placement in google and can damage your high quality score if
    advertising and marketing with Adwords. Well I am adding this RSS to my email and could look out for a
    lot more of your respective intriguing content. Ensure that you update
    this again soon..

  2. Thank you for being the mentor on this theme. I enjoyed the article very much and
    most of all appreciated how you handled the areas I widely known as controversial.
    You happen to be always incredibly kind to readers much like me and assist me in my everyday living.
    Thank you.

  3. I think this web site has got very fantastic indited content material posts.

  4. I genuinely value your piece of work, Great post.

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

twenty − 18 =