avatar

Security operations centers: around the Hash Table.

CyberWire Daily
CyberWire Daily
Episode • Dec 30, 2020 • 27m
Four members of the CyberWire’s Hash Table of experts:

Don Welch: Interim CIO of Penn State University

Helen Patton: CISO for Ohio State University

Bob Turner: CISO for the University of Wisconsin at Madison

Kevin Ford: CISO for the State of North Dakota


discuss SOC Operations in terms of intrusion kills chains, defensive adversary campaigns, insider threats, cyber threat intelligence, zero trust, SOC automation, and SOC analyst skill sets.

Switch to the Fountain App