Build Your Security Operations Program From the Ground Up

Establish security operations with a threat collaboration environment.

Book This Workshop

Building your security operations without a collaborative and iterative strategy for your security operations team leads to:

  • Tribal processes and ownership that silos off important information from other security analysts.
  • Lack of insight into the way multiple processes build on and support one another.

Building your security operations program with a threat collaboration environment leads to:

  • Collaboration across multiple processes that provides overarching visibility into your threat landscape.
  • A prioritized roadmap for maturing and optimizing your security operations program.
  • The ability to make informed decisions on necessary security events within your organization.

Book Your Workshop

Onsite Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn’t enough, we offer low-cost onsite delivery of our Project Workshops. We take you through every phase of your project and ensure that you have a road map in place to complete your project successfully.

Book Now

Member Rating

9.5/10
Overall Impact

$80,487
Average $ Saved

58
Average Days Saved

After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.

Read what our members are saying

Module 1: Establish your foundation

The Purpose

  • Identify security obligations and the security operations program’s pressure posture.
  • Assess current people, process, and technology capabilities.
  • Determine foundational controls and complete system and asset inventory.

Key Benefits Achieved

  • Identified the foundational elements needed for planning before a security operations program can be built

Activities: Outputs:
1.1 Define workshop objectives and current state of knowledge.
1.2 Define security obligations and assess security pressure posture.
1.3 Determine current knowledge and skill gaps.
1.4 Identify services worth monitoring.
1.5 Document roles and responsibilities.
1.6 Assess and document scope & boundaries (your information system environment).
  • Security Pressure Analysis tool
  • Security Operations RACI tool

Module 2: Security operations capability gap analysis

The Purpose

  • Identify the maturity level of existing security operations program processes.

Key Benefits Achieved

  • Current maturity assessment of security operations processes

Activities: Outputs:
2.1 Assess current maturity of security operations capabilities and processes.
2.2 Determine appropriate target state for security operations.
2.3 Identify and document gap closure initiatives.
  • Gap analysis and gap closure initiatives documented in Security Operations Roadmap tool

Module 3: Security operations capability gap analysis (continued)

The Purpose

  • Design your optimized target state.
  • Improve your security operations processes with governance and policy solutions.
  • Identify and prioritize gap initiatives.

Key Benefits Achieved

  • A comprehensive list of initiatives to reach ideal target state
  • Optimized security operations with repeatable and standardized policies

Activities: Outputs:
3.1 Assess current maturity of security operations capabilities and processes.
3.2 Determine appropriate target state for security operations.
3.3 Identify and document gap closure initiatives.
  • Gap analysis and gap closure initiatives documented in Security Operations Roadmap tool

Module 4: Develop an implementation roadmap

The Purpose

  • Formalize project strategy with a project charter.
  • Determine your sourcing strategy for in-house or outsourced security operations processes.
  • Assign responsibilities and complete an implementation roadmap.

Key Benefits Achieved

  • An overarching and documented strategy and vision for your security operations
  • A thorough rationale for in-house or outsourced security operations processes
  • Assigned and documented responsibilities for key projects

Activities: Outputs:
4.1 Prioritize gap closure initiatives based on cost/benefit and dependencies.
4.2 Construct prioritized roadmap of initiatives organized into execution waves.
4.3 Determine in-house vs. outsourcing rationale.
4.4 Reassess RACI chart.
  • Prioritized roadmap of initiatives
  • Security Operations communication deck
  • In-house vs. outsourcing rationale (*optional/time permitting)
  • Security operations metrics summary (*optional/time permitting)
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171