Sustain Business Resilience

RSA Advanced Cyber Defense Practice

A security operations program can enhance business resilience by providing a dedicated function for accelerating threat detection and cyber incident response. The RSA Advanced Cyber Defense Practice can help you staff, design and implement the processes, procedures and technologies required for an advanced security operations center.

Features

Deliverables

Deliverables

Deliverables include SOC Design Reports and Run Books tailored specifically to your organization’s unique requirements. They address staffing and organizational models; processes, procedures and workflows; and tools and technologies (not just RSA).

Cyber Incident Response Framework

Cyber Incident Response Framework

The incident response procedures we recommend are in line with those articulated in the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework

Use Case Framework

Use Case Framework

The RSA Use Case Framework ensures you’ve adequately identified business risks and the controls required to mitigate them. It considers the purpose and goal of controls, the stakeholders responsible for control monitoring, logic and data requirements for controls, controls testing, and response procedures.

Organizational Model

Organizational Model

We identify required roles, skills and certifications, and we design org charts and shift charts to ensure seamless hand-off and escalation processes. Knowing the shortage of cybersecurity talent remains an ongoing challenge for organizations, we offer residency services where consultants from the RSA Advanced Cyber Defense Practice complement your in-house resources for extended periods of time.

Key Engagement Activities

Key Engagement Activities

The RSA Advanced Cyber Defense Practice conducts interviews and workshops with key stakeholders to zero in on current and desired capabilities and identify the people, process and technology requirements for your security operations center. The practice also performs and documents a thorough technology review.

Benefits

​Improve your ability to detect and respond to targeted cyber attacks by synchronizing the people, processes and technology that collectively comprise a security operations center.

​Gain the ability to identify and stop cyber attacks in their earliest stages, before they disrupt business operations or result in stolen data.

​Obtain detailed recommendations for a systems architecture model (including technical and operational specs and capabilities), an organizational and staffing model, and a cyber incident response program for your security operations center.

​Learn what sources of information to capture and what signs to look for to better detect targeted attacks against your organization while eliminating redundant and non-relevant data.

Resources

Solution Briefs

  • Business-Driven Security - RSA NetWitness Threat Detection & Response You have a lot of options if you’re implementing or augmenting a threat detection and response program. There are many viable vendors and options, and some fairly diverse approaches to the process. At RSA, our view is clear. We espouse the idea of Business-Driven Security – integrating security as a core part of your business. We believe this approach improves security in two important dimensions. It makes security teams more operationally effective and empowers teams to more strategically manage security risks. Business-Driven Security is an important evolution in the way organizations think about protecting their IT infrastructure, driven by rapid changes inside and outside an organization, and the fact that legacy approaches to security have become far less effective

Videos

Want a Demo?

Sign up for a free demo today and watch our products in action.

Ready to Buy?

It's easy. Speak with an RSA expert anytime to request a quote.