Readings 2
Readings 2
Effective cybersecurity requires the correct people, processes, and technology. Companies often
pool these three elements into a security operations center. A security operations center (SOC) is an
IT security team that monitors a company’s IT infrastructure to detect, evaluate, neutralize, and
prevent cybersecurity incidents. Traditionally, the term has referred to a physical space where the
security team works; but today, some teams collaborate globally from separate locations, even home
offices. As the distance between team members has expanded, so has the definition of SOC.
An IBM Security Command Center helps prepare a SOC and other involved stakeholders against
current and future cyberthreats. These centers provide SOC facilities and virtual experiences in
which participants can practice collaborating to resolve simulated breach scenarios. Teams use
state-of-the-art security tools, such as pen testing, to combat cyberattacks that test not just teams’
technical expertise but their communication skills and crisis leadership. Experts provide feedback on
the performance of teams and teach best practices through workshops and demonstrations.
IBM Security Command Centers are part of IBM X-Force Security Services. Read the following brief
to learn more about this suite of cybersecurity products and services that IBM provides: Who is X-
Force? (PDF).
X-Force Research
As threats multiply and increase in sophistication, it is more important than ever that organizations
maintain awareness of current security trends.
IBM X-Force Threat Intelligence research reports can help you keep pace with an evolving threat
landscape and learn how to protect your networks and data from the latest threats and attack
vectors. Current reports are available for download, using the links below.
In 2018, many organizations across all industries faced unmanageable levels of cyberthreats
brought on by the changing threat landscape, the risk of exposure, and an ever-growing attack
surface. The optimum strategy to respond to this combination of factors is to make security an
integral part of culture and overall structure. To help organizations better prepare for this landscape,
IBM® Security has developed the X-Force® Threat Intelligence Index report to provide insight on
cybersecurity issues, including what the most common types of attacks are and where they come
from.
IBM Security analyzes data and insight derived from monitored security clients, incident response
services and penetration testing engagements. X-Force also runs spam traps around the world and
monitors tens of millions of spam and phishing attacks daily. It analyzes billions of web pages and
images to detect fraudulent activity and brand abuse.
Download the X-Force Threat Intelligence Index if you have not already done so from the resource
section of a previous lesson. Read the report and keep as a reference guide throughout your
Cybersecurity training.
https://www.ibm.com/security/data-breach/threat-intelligence