Information security operations center

Results: 147



#Item
1Computer security / Information security operations center / Network management / Surveillance / Quantitative analyst / System on a chip / Business process modeling / Computing / Science and technology / Technology

A Human Capital Model for Mitigating Security Analyst Burnout Sathya Chandran Sundaramurthy Kansas State University

Add to Reading List

Source URL: www.usenix.org

Language: English
2System administration / Data security / Splunk / Computing / Information technology management / Information technology / Security operations center / Georgia Tech Research Institute / Cisco Systems / Professional certification

SOLUTION SHEET Big Data Analytics Making all Machine Data Accessible, Usable, Valuable WHY GTRI

Add to Reading List

Source URL: www.gtri.com

Language: English - Date: 2016-03-15 18:34:14
3United States Department of Homeland Security / Fusion center / Privacy Office of the U.S. Department of Homeland Security / Electronic Privacy Information Center / DHS National Protection and Programs Directorate / Information Sharing Environment / DHS Office of Operations Coordination / Surveillance / Privacy Impact Assessment / Einstein / Systematic Alien Verification for Entitlements

COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER to THE DEPARTMENT OF HOMELAND SECURITY “Systems of Records Notice” DHSand

Add to Reading List

Source URL: epic.org

Language: English - Date: 2010-12-16 17:34:47
4Cybercrime / National security / Cyberwarfare / Computer security / Computer network security / Air Force Operational Test and Evaluation Center / 1st Information Operations Command

Microsoft PowerPoint - 0_(Warner)_Cyber_Training_Intro_v5.pptx

Add to Reading List

Source URL: www.dote.osd.mil

Language: English - Date: 2015-06-12 17:08:13
5Computer security / Computer network security / E-commerce / Cybercrime / EMC Corporation / RSA Security / Information security operations center / Security information and event management / Threat / RSA / Phishing / Draft:Threat Intelligence Analyst

RSA ADVANCED SECURITY OPERATIONS CENTER SOLUTION Pervasive Visibility, Rapid Detection, Effective Response OVERVIEW and behavior analysis models to detect and

Add to Reading List

Source URL: i.crn.com

Language: English - Date: 2016-06-29 17:01:32
6Surveillance / Physical security / Security engineering / Multi-monitor / Video wall / Information security operations center / Los Angeles County Metropolitan Transportation Authority / Closed-circuit television / Union Station

Case Study LA Metro Uses Hiperwall Video Walls to Monitor Metro Rail and Bus System Hiperwall provides visualization of LA Metro, enabling situational

Add to Reading List

Source URL: hiperwall.com

Language: English - Date: 2016-07-12 20:19:18
7Computer security / Cyberwarfare / Control engineering / Cybercrime / National security / SANS Institute / SCADA / Critical infrastructure protection / Operational Technology / Information security operations center / Cyber-attack / Stuxnet

PDF Document

Add to Reading List

Source URL: ics.sans.org

Language: English - Date: 2015-12-09 15:17:34
8Surveillance / Data security / System administration / Splunk / Cyberwarfare / Computer network security / Computer security / Security operations center / Security / Information security operations center / International Multilateral Partnership Against Cyber Threats

SECURITY PROFESSIONAL SERVICES Security Professional Services Augmenting Security Staff, Addressing Skill Shortages and Optimizing Your Security Operations With Splunk

Add to Reading List

Source URL: www.splunk.com

Language: English - Date: 2016-08-17 08:31:42
9Computer security / Computer network security / Data security / Cryptography / National security / Information security operations center / Information security / Payment Card Industry Data Security Standard / Security information and event management / Intrusion detection system / Security / Threat

THREAT DETECT DIAGRAM v10 CTP copy

Add to Reading List

Source URL: www.redscan.com

Language: English - Date: 2016-03-21 10:46:55
10Computer security / Hacking / Software testing / Computer network security / Attack patterns / Recommender system / Text mining / Event correlation / Data mining / CAPEC / Intrusion detection system / Information security operations center

Mining known attack patterns from security-related events Nicandro Scarabeo1,2 , Benjamin C.M. Fung3 and Rashid H. Khokhar4 1 Department of Electrical and Information Engineering, University of Cassino and Southern Lazi

Add to Reading List

Source URL: peerj.com

Language: English - Date: 2015-10-07 04:49:41
UPDATE