{"id":19741,"date":"2022-09-15T21:28:29","date_gmt":"2022-09-15T15:58:29","guid":{"rendered":"https:\/\/www.varutra.com\/?p=19741"},"modified":"2022-12-01T17:15:15","modified_gmt":"2022-12-01T11:45:15","slug":"fundamental-of-cyber-resilience-how-it-affects-soc-services","status":"publish","type":"post","link":"https:\/\/www.varutra.com\/varutravrt3\/fundamental-of-cyber-resilience-how-it-affects-soc-services\/","title":{"rendered":"Fundamental of Cyber Resilience &#038; How It Affects SOC Services?"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/varutra-1a3b6.kxcdn.com\/wp-content\/uploads\/2022\/09\/Blog-Feature-Image-Fundamental-of-Cyber-Resilience-How-It-Affects-SOC-Services-1024x576.png\" class=\"sh-overlay-item sh-table-cell\" data-rel=\"lightcase\" title=\"Blog Feature Image Fundamental of Cyber Resilience amp How It Affects SOC Services - Varutra Consulting\"> <\/p>\n<h2><b><span data-contrast=\"none\">Introduction<\/span><\/b><\/h2>\n<p><span data-contrast=\"auto\">\u00a0The Security Operation Centre (SOC) is the backbone of every organization\u2019s security defenses. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Back in the day, the <a href=\"https:\/\/www.varutra.com\/cyber-security-services\/soc-and-global-threat-management-services\/\">SOC<\/a> focused mainly on fulfilling and assessing regulatory compliance. However, since SOCs first arose in the mid-90s, they have evolved at a very speed and show no signs of slowing down.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The pandemic made us realize that many SOC teams have to rethink and restructure the way they work. For many, the focus became making sure that employees could work effectively from home, which resulted in the increased dependency on cloud-based applications and services. This change was prone to serious security risks and elevated the role of SOCs. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Investments required for loud-based infrastructure widened an organization\u2019s already broad threat surface and left corporate networks exposed to new vulnerabilities. As SOCs continue to mature, they are exploring their objectives and making more concerted efforts to stop threats before they can cause damage, rather than simply detecting and responding to threats regularly.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">While companies have started bringing associates back to the office since COVID-19 restrictions eased, remote working is here to stay and needs many changes to ensure operational resilience.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><b><span data-contrast=\"none\">What is Cyber Resilience?<\/span><\/b><\/h2>\n<p><span data-contrast=\"auto\">Cyber resilience is nothing but the ability to continuously deliver the intended outcome despite adverse cyber events.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-19742 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2022\/09\/Figure-1-Fundamental-of-Cyber-Resilience-How-It-Affects-SOC-Services.jpg\" alt=\"Figure 1- Fundamental of Cyber Resilience &amp; How It Affects SOC Services\" width=\"672\" height=\"376\" \/><span data-contrast=\"auto\">Source: Microfocus<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><b><span data-contrast=\"none\">How Does Cyber Resilience Works Based on 5 Strategies?<\/span><\/b><\/h2>\n<p><span data-contrast=\"auto\">An organization is cyber resilient when it can defend against cyber threats, have adequate cybersecurity risk management, and can accelerate guaranteed business continuity during and after cyber incidents.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p style=\"text-align: center\"><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-19743 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2022\/09\/Figure-2-Fundamental-of-Cyber-Resilience-How-It-Affects-SOC-Services.png\" alt=\"Figure 2- Fundamental of Cyber Resilience &amp; How It Affects SOC Services\" width=\"1271\" height=\"611\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/09\/Figure-2-Fundamental-of-Cyber-Resilience-How-It-Affects-SOC-Services.png 1271w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/09\/Figure-2-Fundamental-of-Cyber-Resilience-How-It-Affects-SOC-Services-300x144.png 300w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/09\/Figure-2-Fundamental-of-Cyber-Resilience-How-It-Affects-SOC-Services-1024x492.png 1024w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/09\/Figure-2-Fundamental-of-Cyber-Resilience-How-It-Affects-SOC-Services-768x369.png 768w\" sizes=\"(max-width: 1271px) 100vw, 1271px\" \/>\u00a0<\/span><\/p>\n<p style=\"text-align: center\"><span data-contrast=\"auto\">Source: AMHD Services<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><b><span data-contrast=\"auto\">Identify<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">The identify phase is all about developing a greater organizational understanding of the existing cybersecurity vulnerabilities within your networks, systems, and data, as well as understanding the business context of that risk and the resources needed to support your core operational functions You\u2019ll be able to better focus and prioritize your cybersecurity efforts and align them with your risk management strategy and business needs.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><b><span data-contrast=\"auto\">Protect<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">The protect phase is about flattening the appropriate cybersecurity measures to ensure better service delivery. These include the \u2018first line of defense security applications to prevent, limit or contain the impact of potential threats.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><b><span data-contrast=\"auto\">Detect<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:1080,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><span data-contrast=\"auto\">The detect phase involves enabling the timely discovery of cyber incidents and defining the activities needed to identify and respond to a cybersecurity event.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:1080,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><b><span data-contrast=\"auto\">Respond<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">The Respond function is all about taking the necessary action to deal with a live cybersecurity event and having incident management in place. It must support your organization\u2019s capability to respond to and contain the impact of a potential cyber incident.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:1080,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:1080,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><b><span data-contrast=\"auto\">Recover<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:1080,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><span data-contrast=\"auto\">Recover is the final stage and important step, which looks at identifying the appropriate activities to restore service or operations affected by a cybersecurity incident and reduce the impact.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:1080,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:1080,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><b><span data-contrast=\"none\">How\u202fCyber Resilience Affects\u00a0SOC Services and 5 Ways to Build In\u00a0Cyber Resilience With Intelligent Threat Operations?<\/span><\/b><\/h2>\n<p><span data-contrast=\"auto\">Having the best cybersecurity strategies in place will help us protect, detect and evolve from the latest Cybersecurity threats, which can be made more efficient by applying modern techniques and tactics as mentioned below.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><b><span data-contrast=\"auto\">Align cybersecurity priorities with business-value chains<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">In many organizations, business groups, IT departments, and risk functions frequently have conflicting agendas and unclear working relationships.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">As a result, many organizations attempt to follow and apply the same cyber-risk controls everywhere in a similar manner. Most of the time, this results in a waste of time and money, but it can also result in a lack of priority for assets and functions critical to the business-value chains.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Security operations teams (SOC) must focus first on the business problem and consider the whole enterprise to identify and prioritize the top risks.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Cybersecurity budgets often compete with technology investments for limited funds, so security teams need to consider the entire enterprise, collaborating with a multidisciplinary team to consider security problems and risks from the standpoint of enabling the business.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><b><span data-contrast=\"auto\">Identify critical business resources to prioritize protection<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">A primary focus of cyber resilience is the identification and protection of the organization\u2019s digital crown jewels. In any given enterprise, some of the data, systems, and applications are more critical as compared to others. In addition, some are more exposed to risk, while others are least likely to be targeted. The organization must focus its strongest protections on its most critical systems and assets, especially assets that meet a trifecta of criteria: highly critical for the business, exposed to greater risk, and likely to be targeted. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:360,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><b><span data-contrast=\"auto\">Conduct intelligence gathering to determine attacker motives<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">While threat modeling, risk reviews, and vulnerability analyses must focus on the value of an asset to the organization and potential shortcomings in defenses, the profile of adversaries who may attack the organization are also important. <a href=\"https:\/\/www.varutra.com\/threat-modelling-focused-defence-for-modern-enterprises\/\">Threat Modeling<\/a> states about attackers and how they operate, which helps to identify new gaps and direct funds to strengthen weak points that are likely to be targeted.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This is an intelligence data-driven process, but it\u2019s critical. While an organization will want to have internal expertise, bringing in security consultants can help an organization with a second set of eyes. In addition to, third parties that specialize in threat intelligence and monitor a wide range of sources and most likely have resources that the average business may not afford.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In the end, improving defenses allows organizations to engage and stop attackers in real-time by combining threat intelligence, machine learning, and analytics resources within the IT function.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><b><span data-contrast=\"auto\">Create a cybersecurity capability to support resilience like SIEM Solution<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">SIEM systems provide real-time detection of known attacks. With the help of a framework like MITRE ATT&amp;CK, which provides us a reference model for measuring the effectiveness of an organization\u2019s detection strength and the vital impact of deploying other security technologies. Anomaly-detection models look for behavior that digresses from typical patterns, such as an unusual behavior by a user. An organization with an active-defense posture uses both SIEMs and anomaly-defense systems to provide more comprehensive threat detection.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><b><span data-contrast=\"auto\">Make a Note of Everything<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Make a note of the latest cyber security threats through social media, newsletters, and forums, and have a periodical risk assessment, VAPT, to find and close the gaps on time to safeguard the organization from threats like Zero-day attacks.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span data-contrast=\"auto\">Author,<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><strong>Parag Bhamare,\u00a0<\/strong><\/p>\n<p><span data-contrast=\"auto\">Asst. Manager SOC,<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Varutra Consulting Pvt. Ltd.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Introduction \u00a0The Security Operation Centre (SOC) is the backbone of every organization\u2019s security defenses. \u00a0 Back in the day, the SOC focused mainly on fulfilling&#8230;<\/p>\n","protected":false},"author":4,"featured_media":19747,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1,274],"tags":[683,684,407,685],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.6.3 - aioseo.com -->\n\t\t<meta name=\"description\" content=\"Cyber resilience is about an organization defending against cyber threats and can accelerate guaranteed business continuity during and after cyber incidents.\" \/>\n\t\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t\t<link rel=\"canonical\" href=\"https:\/\/www.varutra.com\/varutravrt3\/fundamental-of-cyber-resilience-how-it-affects-soc-services\/\" \/>\n\t\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.6.3\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Varutra Consulting\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Fundamentals of Cyber Resilience &amp; Affects on SOC Services\" \/>\n\t\t<meta property=\"og:description\" content=\"Cyber resilience is about an organization defending against cyber threats and can accelerate guaranteed business continuity during and after cyber incidents.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.varutra.com\/varutravrt3\/fundamental-of-cyber-resilience-how-it-affects-soc-services\/\" \/>\n\t\t<meta property=\"article:tag\" content=\"cyber resilience\" \/>\n\t\t<meta property=\"article:tag\" content=\"intelligent threat operations\" \/>\n\t\t<meta property=\"article:tag\" content=\"soc\" \/>\n\t\t<meta property=\"article:tag\" content=\"soc services\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2022-09-15T15:58:29+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2022-12-01T11:45:15+00:00\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Fundamentals of Cyber Resilience &amp; Affects on SOC Services\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Cyber resilience is about an organization defending against cyber threats and can accelerate guaranteed business continuity during and after cyber incidents.\" \/>\n\t\t<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t\t<meta name=\"twitter:data1\" content=\"kalpblogger\" \/>\n\t\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/fundamental-of-cyber-resilience-how-it-affects-soc-services\\\/#article\",\"name\":\"Fundamentals of Cyber Resilience & Affects on SOC Services\",\"headline\":\"Fundamental of Cyber Resilience &#038; How It Affects SOC Services?\",\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/Blog-Feature-Image-Fundamental-of-Cyber-Resilience-How-It-Affects-SOC-Services.png\",\"width\":2240,\"height\":1260,\"caption\":\"Blog Feature Image - Fundamental of Cyber Resilience &amp; How It Affects SOC Services\"},\"datePublished\":\"2022-09-15T21:28:29+05:30\",\"dateModified\":\"2022-12-01T17:15:15+05:30\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/fundamental-of-cyber-resilience-how-it-affects-soc-services\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/fundamental-of-cyber-resilience-how-it-affects-soc-services\\\/#webpage\"},\"articleSection\":\"General, Security Hardening, Cyber Resilience, Intelligent Threat Operations, SOC, SOC Services\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/fundamental-of-cyber-resilience-how-it-affects-soc-services\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"nextItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/fundamental-of-cyber-resilience-how-it-affects-soc-services\\\/#listItem\"},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/fundamental-of-cyber-resilience-how-it-affects-soc-services\\\/#listItem\",\"position\":2,\"name\":\"Fundamental of Cyber Resilience & How It Affects SOC Services?\",\"previousItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\"}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\",\"name\":\"Varutra\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Varutra-Found-e1612984024606.jpg\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/fundamental-of-cyber-resilience-how-it-affects-soc-services\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/fundamental-of-cyber-resilience-how-it-affects-soc-services\\\/#organizationLogo\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/\",\"name\":\"kalpblogger\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/fundamental-of-cyber-resilience-how-it-affects-soc-services\\\/#authorImage\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5e96a9b330da7c941c1e39217a2fbe38?s=96&d=mm&r=g\",\"width\":96,\"height\":96,\"caption\":\"kalpblogger\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/fundamental-of-cyber-resilience-how-it-affects-soc-services\\\/#webpage\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/fundamental-of-cyber-resilience-how-it-affects-soc-services\\\/\",\"name\":\"Fundamentals of Cyber Resilience & Affects on SOC Services\",\"description\":\"Cyber resilience is about an organization defending against cyber threats and can accelerate guaranteed business continuity during and after cyber incidents.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/fundamental-of-cyber-resilience-how-it-affects-soc-services\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/Blog-Feature-Image-Fundamental-of-Cyber-Resilience-How-It-Affects-SOC-Services.png\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/fundamental-of-cyber-resilience-how-it-affects-soc-services\\\/#mainImage\",\"width\":2240,\"height\":1260,\"caption\":\"Blog Feature Image - Fundamental of Cyber Resilience &amp; How It Affects SOC Services\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/fundamental-of-cyber-resilience-how-it-affects-soc-services\\\/#mainImage\"},\"datePublished\":\"2022-09-15T21:28:29+05:30\",\"dateModified\":\"2022-12-01T17:15:15+05:30\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"name\":\"Varutra Consulting\",\"description\":\"Secure your digital world with our Cybersecurity services.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Fundamentals of Cyber Resilience &amp; Affects on SOC Services<\/title>\n\n","aioseo_head_json":{"title":"Fundamentals of Cyber Resilience & Affects on SOC Services","description":"Cyber resilience is about an organization defending against cyber threats and can accelerate guaranteed business continuity during and after cyber incidents.","canonical_url":"https:\/\/www.varutra.com\/varutravrt3\/fundamental-of-cyber-resilience-how-it-affects-soc-services\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"og:locale":"en_US","og:site_name":"Varutra Consulting","og:type":"article","og:title":"Fundamentals of Cyber Resilience &amp; Affects on SOC Services","og:description":"Cyber resilience is about an organization defending against cyber threats and can accelerate guaranteed business continuity during and after cyber incidents.","og:url":"https:\/\/www.varutra.com\/varutravrt3\/fundamental-of-cyber-resilience-how-it-affects-soc-services\/","article:tag":["cyber resilience","intelligent threat operations","soc","soc services"],"article:published_time":"2022-09-15T15:58:29+00:00","article:modified_time":"2022-12-01T11:45:15+00:00","twitter:card":"summary_large_image","twitter:title":"Fundamentals of Cyber Resilience &amp; Affects on SOC Services","twitter:description":"Cyber resilience is about an organization defending against cyber threats and can accelerate guaranteed business continuity during and after cyber incidents.","twitter:label1":"Written by","twitter:data1":"kalpblogger","twitter:label2":"Est. reading time","twitter:data2":"5 minutes","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.varutra.com\/varutravrt3\/fundamental-of-cyber-resilience-how-it-affects-soc-services\/#article","name":"Fundamentals of Cyber Resilience & Affects on SOC Services","headline":"Fundamental of Cyber Resilience &#038; How It Affects SOC Services?","author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/09\/Blog-Feature-Image-Fundamental-of-Cyber-Resilience-How-It-Affects-SOC-Services.png","width":2240,"height":1260,"caption":"Blog Feature Image - Fundamental of Cyber Resilience &amp; How It Affects SOC Services"},"datePublished":"2022-09-15T21:28:29+05:30","dateModified":"2022-12-01T17:15:15+05:30","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/fundamental-of-cyber-resilience-how-it-affects-soc-services\/#webpage"},"isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/fundamental-of-cyber-resilience-how-it-affects-soc-services\/#webpage"},"articleSection":"General, Security Hardening, Cyber Resilience, Intelligent Threat Operations, SOC, SOC Services"},{"@type":"BreadcrumbList","@id":"https:\/\/www.varutra.com\/varutravrt3\/fundamental-of-cyber-resilience-how-it-affects-soc-services\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/#listItem","position":1,"name":"Home","item":"https:\/\/www.varutra.com\/varutravrt3\/","nextItem":"https:\/\/www.varutra.com\/varutravrt3\/fundamental-of-cyber-resilience-how-it-affects-soc-services\/#listItem"},{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/fundamental-of-cyber-resilience-how-it-affects-soc-services\/#listItem","position":2,"name":"Fundamental of Cyber Resilience & How It Affects SOC Services?","previousItem":"https:\/\/www.varutra.com\/varutravrt3\/#listItem"}]},{"@type":"Organization","@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization","name":"Varutra","url":"https:\/\/www.varutra.com\/varutravrt3\/","logo":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Varutra-Found-e1612984024606.jpg","@id":"https:\/\/www.varutra.com\/varutravrt3\/fundamental-of-cyber-resilience-how-it-affects-soc-services\/#organizationLogo"},"image":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/fundamental-of-cyber-resilience-how-it-affects-soc-services\/#organizationLogo"}},{"@type":"Person","@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author","url":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/","name":"kalpblogger","image":{"@type":"ImageObject","@id":"https:\/\/www.varutra.com\/varutravrt3\/fundamental-of-cyber-resilience-how-it-affects-soc-services\/#authorImage","url":"https:\/\/secure.gravatar.com\/avatar\/5e96a9b330da7c941c1e39217a2fbe38?s=96&d=mm&r=g","width":96,"height":96,"caption":"kalpblogger"}},{"@type":"WebPage","@id":"https:\/\/www.varutra.com\/varutravrt3\/fundamental-of-cyber-resilience-how-it-affects-soc-services\/#webpage","url":"https:\/\/www.varutra.com\/varutravrt3\/fundamental-of-cyber-resilience-how-it-affects-soc-services\/","name":"Fundamentals of Cyber Resilience & Affects on SOC Services","description":"Cyber resilience is about an organization defending against cyber threats and can accelerate guaranteed business continuity during and after cyber incidents.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#website"},"breadcrumb":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/fundamental-of-cyber-resilience-how-it-affects-soc-services\/#breadcrumblist"},"author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"creator":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2022\/09\/Blog-Feature-Image-Fundamental-of-Cyber-Resilience-How-It-Affects-SOC-Services.png","@id":"https:\/\/www.varutra.com\/varutravrt3\/fundamental-of-cyber-resilience-how-it-affects-soc-services\/#mainImage","width":2240,"height":1260,"caption":"Blog Feature Image - Fundamental of Cyber Resilience &amp; How It Affects SOC Services"},"primaryImageOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/fundamental-of-cyber-resilience-how-it-affects-soc-services\/#mainImage"},"datePublished":"2022-09-15T21:28:29+05:30","dateModified":"2022-12-01T17:15:15+05:30"},{"@type":"WebSite","@id":"https:\/\/www.varutra.com\/varutravrt3\/#website","url":"https:\/\/www.varutra.com\/varutravrt3\/","name":"Varutra Consulting","description":"Secure your digital world with our Cybersecurity services.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"}}]}},"aioseo_meta_data":{"post_id":"19741","title":"Fundamentals of Cyber Resilience &amp; Affects on SOC Services&nbsp;","description":"Cyber resilience is about an organization defending against cyber threats and can accelerate guaranteed business continuity during and after cyber incidents.","keywords":[],"keyphrases":"{\"focus\":{\"keyphrase\":\"Cyber Resilience\",\"score\":80,\"analysis\":{\"keyphraseInTitle\":{\"title\":\"Focus keyphrase in SEO title\",\"description\":\"Focus keyphrase found in SEO title.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInDescription\":{\"title\":\"Focus keyphrase in meta description\",\"description\":\"Focus keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Focus keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInURL\":{\"title\":\"Focus keyphrase in URL\",\"description\":\"Focus keyphrase used in the URL.\",\"score\":5,\"maxScore\":5,\"error\":0},\"keyphraseInIntroduction\":{\"title\":\"Focus keyphrase in introduction\",\"description\":\"Your Focus keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInSubHeadings\":{\"title\":\"Focus keyphrase in Subheadings\",\"description\":\"Use more focus keyphrases in your H2 and H3 subheadings!\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Focus keyphrase in image alt attributes\",\"description\":\"Focus keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}},\"additional\":[{\"keyphrase\":\"SOC\",\"score\":67,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase not found in meta description.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":1},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}}]}","primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":[],"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":"{\"article\":{\"articleType\":\"BlogPosting\"},\"course\":{\"name\":\"\",\"description\":\"\",\"provider\":\"\"},\"faq\":{\"pages\":[]},\"product\":{\"reviews\":[]},\"recipe\":{\"ingredients\":[],\"instructions\":[],\"keywords\":[]},\"software\":{\"reviews\":[],\"operatingSystems\":[]},\"webPage\":{\"webPageType\":\"WebPage\"}}","pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"limit_modified_date":false,"open_ai":null,"created":"2022-09-15 15:57:31","updated":"2022-12-01 11:53:28"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\/category\/general\/\" title=\"General\">General<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\tFundamental of Cyber Resilience &amp; How It Affects SOC Services?\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.varutra.com\/varutravrt3"},{"label":"General","link":"https:\/\/www.varutra.com\/varutravrt3\/category\/general\/"},{"label":"Fundamental of Cyber Resilience &#038; How It Affects SOC Services?","link":"https:\/\/www.varutra.com\/varutravrt3\/fundamental-of-cyber-resilience-how-it-affects-soc-services\/"}],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/19741"}],"collection":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/comments?post=19741"}],"version-history":[{"count":3,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/19741\/revisions"}],"predecessor-version":[{"id":20155,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/19741\/revisions\/20155"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media\/19747"}],"wp:attachment":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media?parent=19741"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/categories?post=19741"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/tags?post=19741"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}