Why people are key to successful security operations centres
Don’t rely on technology alone, say telecoms cyber chiefs


Talented people and proper processes are more important than technology when it comes to running a successful security operations centre (SOC), delegates at Infosecurity Europe 2017 in London were told yesterday.
Emma Smith, technology security director at Vodafone, said that organisations should not get "swept up" in the flood of tools hitting the market.
She said that process, behaviour and culture can deliver "more bang per buck" that technology ever could. Smith added that it was more important to "attract and retain the right people".
A clear career path offered by firms was key to attracting the right people to an IT organisation, she said.
Close Brothers CISO Chris Gibson if organisations gave people interesting jobs it would "keep them interested".
O2 Telefonica director of business operations, Adrian Gorham said that having the right processes in place was vital to managing an effective SOC, as the operations centre cannot run in isolation from other parts of the organisation.
Gorham said such an operations centre "monitors and picks up alerts" but needs good relationships with the rest of the business and this also means needing to "work with business analysts and system architects".
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Head of information security at the London Metal Exchange, Russell Wing, said that an SOC needed the right metrics in place as well as response processes to quickly close down any attacks. He added that you "cannot secure what you don't measure" and what "happens in your environment you need to know".
Rene Millman is a freelance writer and broadcaster who covers cybersecurity, AI, IoT, and the cloud. He also works as a contributing analyst at GigaOm and has previously worked as an analyst for Gartner covering the infrastructure market. He has made numerous television appearances to give his views and expertise on technology trends and companies that affect and shape our lives. You can follow Rene Millman on Twitter.
-
Should AI PCs be part of your next hardware refresh?
AI PCs are fast becoming a business staple and a surefire way to future-proof your business
By Bobby Hellard Published
-
Westcon-Comstor and Vectra AI launch brace of new channel initiatives
News Westcon-Comstor and Vectra AI have announced the launch of two new channel growth initiatives focused on the managed security service provider (MSSP) space and AWS Marketplace.
By Daniel Todd Published
-
PyPI attack: Targeting of repository 'shows no sign of stopping'
News Greater collaboration and understanding of attackers’ tactics is key to mitigating open source security threats
By Ross Kelly Published
-
Capita's handling of cyber attack shows companies still fail at breach reporting
Analysis Capita initially told customers there was “no evidence” of data having been compromised in the March cyber attack
By Ross Kelly Published
-
Malware being pushed to businesses by search engines remains a pervasive threat
News High-profile malvertising campaigns in recent months have surged
By Ross Kelly Published
-
There's only one way to avoid credential stuffing attacks
Opinion PayPal accounts were breached last year due to a credential stuffing attack, but can PayPal avoid taking responsibility?
By Davey Winder Published
-
Five things to consider before choosing an MFA solution
In-depth Because we all should move on from using “password” as a password
By Rene Millman Published
-
Cyber security suffers from a communication problem
News Negative language around ‘human failures’ is eroding trust between security teams and broader business functions - it has to stop
By Ross Kelly Published
-
Does LastPass really deserve a last chance?
Opinion After several disastrous security incidents and a communications breakdown, it’s time to leave LastPass for pastures new
By Ross Kelly Published
-
What is the spell-jacking vulnerability and how can your business avoid exposing data?
In-depth Spell-jacking vulnerabilities are threatening to unwittingly leak data to third parties, undermining any drive to protect privacy
By Davey Winder Published