­
COVID-19: How To protect Organizations from Cyber Attack using iSOC - All Articles - CISO Platform

Lets talk on why we need iSOC in the COVID situation. 

Enterprises are moving towards a different working organization due to Covid19 pandemic situation - major part of employees within the organization are bound to work remotely, which is increasing their exposure to security threats including phishing, hacking, adware & malware attacks, e-mail & application vulnerabilities etc.

Means the COVID-19 pandemic has led to a surge in cybercrime, and moreover attackers use people’s fears to prey on businesses and individuals.

Security Challenges during COVID-19

During this new Normal situation, business are facing following few major challenges:

  1. Insider threats risks due to working from home scenario
  2. Increased phishing email attacks,
  3. Weak endpoint security due to unsecure home network as well as personal devices
  4. Increased malware/ ransomware attacks in this new normal working situations

In times of this crisis, good security practices are often the first thing to go.

iSOC offer addresses all these challenges and provide a seamless experience to our esteemed customers and end users.

 

Lets Talk what is iSOC

In Normal SOC, Security Analyst performs various generic SOC activities like (not an exhaustive list):

  1. Alerts & Notification
  2. Proactive Monitoring
  3. Event correlation
  4. Compliance & Audit
  5. VAPT
  6. Risk management

 

In normal monitoring, if your security alert tool providers are not updated to handle zero days vulnerability, you are prone to get attacked as many of tool providers, we have seen, not upto date on their threat signature updates.

 

How to Build iSOC

We suggest following best practices for iSOC

  1. Use public clouds for new iSOC development – it reduces hardware procurement cycle as well as manually managing high availability and disaster recovery functionalities which are very important for iSOC. It also helps for connecting iSOC from anywhere as your iSOC team may be working from home at this COVID-19 time.
  2. Use industry standard SOC and Runbook template instead of reinventing these
  3. Use various AIML based iSOC enablers like threat hunting automation, Phishing emails attacks analysis automation etc. to automate and to make these operations more proactive and intelligent. These enablers help to detect almost Realtime threats and prepare your periphery security devices to block such attacks.

 

Please connect me for more information.

Votes: 0
E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

Join The Community Discussion

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

CISO Platform Talks : Security FireSide Chat With A Top CISO or equivalent (Monthly)

  • Description:

    CISO Platform Talks: Security Fireside Chat With a Top CISO

    Join us for the CISOPlatform Fireside Chat, a power-packed 30-minute virtual conversation where we bring together some of the brightest minds in cybersecurity to share strategic insights, real-world experiences, and emerging trends. This exclusive monthly session is designed for senior cybersecurity leaders looking to stay ahead in an ever-evolving landscape.

    We’ve had the privilege of…

  • Created by: Biswajit Banerjee
  • Tags: ciso, fireside chat

CISO Talk (Chennai Chapter) - AI Code Generation Risks: Balancing Innovation and Security

  • Description:

    We’re excited to invite you to an exclusive CISO Talk (Chennai Chapter) on “AI Code Generation Risks: Balancing Innovation and Security” featuring Ramkumar Dilli (Chief Information Officer, Myridius).

    In this session, we’ll explore how security leaders can navigate the risks of AI-generated code, implement secure development guardrails, and strike the right balance between innovation and security. AI…

  • Created by: Biswajit Banerjee
  • Tags: ciso talk

CISO MeetUp: Executive Cocktail Reception @ Black Hat USA , Las Vegas 2025

  • Description:

    We are excited to invite you to the CISO MeetUp: Executive Cocktail Reception if you are there at the Black Hat Conference USA, Las Vegas 2025. This event is organized by EC-Council & FireCompass with CISOPlatform as proud community partner. 

    This evening is designed for Director-level and above cybersecurity professionals to connect, collaborate, and unwind in a relaxed setting. Enjoy…

  • Created by: Biswajit Banerjee
  • Tags: black hat 2025, ciso meetup, cocktail reception, usa events, cybersecurity events, ciso

6 City Playbook Round Table Series (Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata)

  • Description:

    Join us for an exclusive 6-city roundtable series across Delhi, Mumbai, Bangalore, Pune, Chennai, and Kolkata. Curated for top cybersecurity leaders, this series will spotlight proven strategies, real-world insights, and impactful playbooks from the industry’s best.

    Network with peers, exchange ideas, and contribute to shaping the Top 100 Security Playbooks of the year.

    Date : Sept 2025 - Oct 2025

    Venue: Delhi, Mumbai, Bangalore, Pune,…

  • Created by: Biswajit Banerjee