SERVICECISO Services
With the increasing number of types of cyber attacks and the increasing number of opportunities to be attacked, it is difficult for each company to continue to respond independently, and the need for a C-SIRT to monitor cyber attacks and coordinate with other organizations is increasing. However, the amount of work required to build a C-SIRT from scratch is enormous, and many customers have considered the possibility of building a C-SIRT but have given up on the idea. IDR, which has supported the establishment of C-SIRTs for numerous clients, provides total support for SOC operations, including system construction and human resource training.
We solve your problems
After hearing the following information from the client, we will conduct a survey to determine whether integration can be achieved and whether security vulnerabilities need to be addressed.
・The roles of C-SIRT and outsourced operations
・Inventory of information assets
・Information storage, retrieval, sharing, and communication methods
We integrate your systems and environments into a unified platform so that they can be completed with a single UI. During construction, we check with the client to ensure that the UI is comfortable to use and that the necessary information is included in the reports.
A IDR engineer is appointed to deal directly with the customer. The customer and the engineer in charge coordinate to develop a plan for creating a workflow that cannot be implemented with standard functions. After the plan is drafted, a PoC will be conducted in consideration of the client's ROI and risk assessment before the workflow is built.
After implementation, we periodically review the effects of workflow automation, especially for operations that have changed significantly, and analyze whether there are any areas for improvement.
・For systems and settings that are determined to be out of the scope of integration, we will customize Playbook.
・In addition to the above, IDR's security specialists will also continue to investigate and monitor the entire system.