{"id":14133,"date":"2020-09-01T13:00:08","date_gmt":"2020-09-01T12:00:08","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=14133"},"modified":"2020-08-28T20:21:18","modified_gmt":"2020-08-28T19:21:18","slug":"the-soc-died-of-boredom-fatigue-and-poor-positioning-find-out-how-to-resuscitate-it","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/09\/the-soc-died-of-boredom-fatigue-and-poor-positioning-find-out-how-to-resuscitate-it\/","title":{"rendered":"The SOC died of boredom, fatigue and poor positioning? Find out how to resuscitate it!"},"content":{"rendered":"<p>At a time when the internalized IS is no more than a distant memory giving way to a multiplication of external services hosting data, the SOC&#8217;s mission remains the same: to detect cybersecurity incidents in order to react as quickly as possible. But how do you detect in an information system where boundaries are no longer defined? Mission Impossible? Maybe not.<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"post-14134 media-14134\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-14134 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/Image-0-1.png\" alt=\"\" width=\"823\" height=\"463\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/Image-0-1.png 823w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/Image-0-1-340x191.png 340w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/Image-0-1-69x39.png 69w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/Image-0-1-768x432.png 768w\" sizes=\"auto, (max-width: 823px) 100vw, 823px\" \/><\/figure>\n<p>&nbsp;<\/p>\n<p>Fifteen years ago, when we first started working on SOC implementations for our clients, defining a roadmap was simple: set up a tool, then collect and analyze the logs of security equipment and critical\/exposed assets.<\/p>\n<p>However, new challenges linked to the IS decentralization, the evolution of an ever-evolving threat and the crisis we are going through (teleworking, reduction in cybersecurity budgets&#8230;) must make us realize that the SOC must reinvent itself.<\/p>\n<p>&nbsp;<\/p>\n<h2>Involve (really) everyone!<\/h2>\n<p>By rewriting the story from the beginning, the SOC is managed by the cybersecurity population, which has therefore set up monitoring mechanisms on cybersecurity equipment with cybersecurity use-cases. The result is mixed, it works quite well, and the figures from our <a href=\"https:\/\/www.wavestone.com\/en\/insight\/cyber-attack-france\/\">CERT benchmark<\/a> are there to prove it: 167 days on average to detect an incident!<\/p>\n<p>The first detection strategies were obviously defined, challenged and validated by the cybersecurity industry. Their objective was to increasingly extend the surveillance perimeter by collecting more and more logs (firewalls, WAF, \u2026) and setting up new surveillance equipment (SIEM, probes, \u2026).<\/p>\n<p>This first observation was inevitably found in the majority of our SOC audit conclusions: <strong>objectives are poorly defined and not aligned with the expectations of SOC clients (CISOs, CIOs, business functions), leading to a loss of trust and credibility.<\/strong><\/p>\n<p>Striking examples can explain this feeling: lack of SLAs, poorly defined perimeter, too raw reporting that is too raw, non-contextualized and containing erroneous information.<\/p>\n<p>If you do not want to redefine your SOC strategy once again in a one-sided way, organizing a seminar is the right exercise to establish a new starting point. All the stakeholders must be present (cybersecurity teams, CIOs, SOC clients, &#8230;) and the goal is to address the main issues:<\/p>\n<ul>\n<li><strong>Redefining objectives:<\/strong> concentrating surveillance on much smaller perimeters that are both technically and humanly feasible<\/li>\n<li><strong>Clarifying governance:<\/strong> redefining the positioning and role of the SOC in the organization<\/li>\n<li><strong>Redesigning reporting:<\/strong> sharing customer misunderstandings in order to provide the right level of information.<\/li>\n<\/ul>\n<p>We have seen that this step, which is essential to the renewal of the SOC, enables an entire ecosystem to be federated around a common target.<\/p>\n<p>&nbsp;<\/p>\n<h2>Give priority to quality over quantity!<\/h2>\n<p>Paradoxically, although the attack area of the IS has significantly increased, the priority is indeed to restrict the surveillance scope to focus on what is really valued.<\/p>\n<p>Firstly, once the functional perimeter of surveillance has been redefined and validated by all, the SOC mission is to technically translate these new objectives into detection scenarios in the tools. There is no need to reinvent the wheel, because new frameworks such as <a href=\"https:\/\/attack.mitre.org\/\">MITRE ATT&amp;CK<\/a> now allow the different types of attacks to be clearly identified and materialized (techniques used, examples\/references and suggestions for detection). The objective is obviously not to be able to cover all the techniques that can be used (330 in total) but to prioritize the efforts on what will allow the objectives to be achieved.<\/p>\n<p>In addition, an HR observation was also raised in most of our audits: <strong>teams lack motivation, experience and autonomy to bring added value to operations.<\/strong><\/p>\n<p>This leads to a high turnover because some tasks are considered uninteresting. The objective is to concentrate human effort on what really brings added value. We have assisted many customers in the implementation of SOAR (Security Orchestration, Automation and Response) tools to automate repetitive tasks of the teams in charge of analysis and reaction. These tools are extremely effective in automating the processing of common, very annoying attacks (ransomware, phishing&#8230;) which account for a large proportion of alerts.<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"post-14136 media-14136\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-14136 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/Image-1-3.png\" alt=\"\" width=\"1158\" height=\"653\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/Image-1-3.png 1158w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/Image-1-3-339x191.png 339w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/Image-1-3-69x39.png 69w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/Image-1-3-768x433.png 768w\" sizes=\"auto, (max-width: 1158px) 100vw, 1158px\" \/><\/figure>\n<p>&nbsp;<\/p>\n<p>Once these measures are in place, the teams can then be mobilized on activities with higher added value such as the implementation of automation tasks or Threat Hunting activities.<\/p>\n<p>&nbsp;<\/p>\n<h2>And now, improve and challenge each other continuously!<\/h2>\n<p>Once all the foundations are in place to breathe new life into your SOC, how do you stay up to date?<\/p>\n<p>The answer to this question would have been complex 5 years ago, but many recognized standards now allow us to assess the maturity of the SOC in a continuous improvement process. SOC CMM is the perfect example, as this framework enables self-assessment based on a set of precise questions addressing all the issues in terms of tools and organization. This methodology has enabled us to support customers on many before\/after comparisons.<\/p>\n<p>Red Team or Purple Team operations are also excellent ways to challenge the systems put in place in relation to the defined objectives. These exercises highlight concrete examples of vulnerabilities as well as precise recommendations to remedy them. In addition, the MITRE ATT&amp;CK Framework can be used to consolidate the tests carried out by type of attack, as well as their results.<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"post-14130 media-14130\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-14130 aligncenter\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/Image-2-1.png\" alt=\"\" width=\"1148\" height=\"649\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/Image-2-1.png 1148w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/Image-2-1-338x191.png 338w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/Image-2-1-69x39.png 69w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/Image-2-1-768x434.png 768w\" sizes=\"auto, (max-width: 1148px) 100vw, 1148px\" \/><\/figure>\n<p>&nbsp;<\/p>\n<p>These various initiatives do not provide an exhaustive overview of the problems that SOC are currently facing, but they do highlight our main findings: <strong>an isolated SOC, poorly configured tools and demobilized teams.<\/strong><\/p>\n<p>The exercise of redefining a SOC strategy is a great opportunity to re-mobilize an entire ecosystem under the same banner. This initiative helps to give new meaning to both operational teams and all the stakeholders in the SOC activity. So\u2026 let\u2019s do it!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>At a time when the internalized IS is no more than a distant memory giving way to a multiplication of external services hosting data, the SOC&#8217;s mission remains the same: to detect cybersecurity incidents in order to react as quickly&#8230;<\/p>\n","protected":false},"author":92,"featured_media":14124,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2777,3273],"tags":[3619,3102,3616,3617,3618,3126,2877],"coauthors":[931,2664],"class_list":["post-14133","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-ethical-hacking-indicent-response-en","tag-continuous-improvement","tag-governance","tag-objectives","tag-quality","tag-reporting-en","tag-soc-en","tag-strategy"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The SOC died of boredom, fatigue and poor positioning? Resuscitate it!<\/title>\n<meta name=\"description\" content=\"The exercise of redefining a SOC strategy is a great opportunity to re-mobilize an entire ecosystem under the same banner.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/09\/the-soc-died-of-boredom-fatigue-and-poor-positioning-find-out-how-to-resuscitate-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The SOC died of boredom, fatigue and poor positioning? Resuscitate it!\" \/>\n<meta property=\"og:description\" content=\"The exercise of redefining a SOC strategy is a great opportunity to re-mobilize an entire ecosystem under the same banner.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/09\/the-soc-died-of-boredom-fatigue-and-poor-positioning-find-out-how-to-resuscitate-it\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-01T12:00:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/Fotolia_73142653_Subscription_Monthly_XXL-Vector-illustration-concept-for-new-business-project-startup.\u00a9-oberonsk.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"2560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Beno\u00eet Marion\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Beno\u00eet Marion\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/09\/the-soc-died-of-boredom-fatigue-and-poor-positioning-find-out-how-to-resuscitate-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/09\/the-soc-died-of-boredom-fatigue-and-poor-positioning-find-out-how-to-resuscitate-it\/\"},\"author\":{\"name\":\"Beno\u00eet Marion\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8269382799f649bb774493a375d57d31\"},\"headline\":\"The SOC died of boredom, fatigue and poor positioning? Find out how to resuscitate it!\",\"datePublished\":\"2020-09-01T12:00:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/09\/the-soc-died-of-boredom-fatigue-and-poor-positioning-find-out-how-to-resuscitate-it\/\"},\"wordCount\":942,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/09\/the-soc-died-of-boredom-fatigue-and-poor-positioning-find-out-how-to-resuscitate-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/Fotolia_73142653_Subscription_Monthly_XXL-Vector-illustration-concept-for-new-business-project-startup.\u00a9-oberonsk.jpg\",\"keywords\":[\"continuous improvement\",\"governance\",\"objectives\",\"quality\",\"reporting\",\"SOC\",\"Strategy\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Ethical Hacking &amp; Incident Response\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/09\/the-soc-died-of-boredom-fatigue-and-poor-positioning-find-out-how-to-resuscitate-it\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/09\/the-soc-died-of-boredom-fatigue-and-poor-positioning-find-out-how-to-resuscitate-it\/\",\"name\":\"The SOC died of boredom, fatigue and poor positioning? Resuscitate it!\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/09\/the-soc-died-of-boredom-fatigue-and-poor-positioning-find-out-how-to-resuscitate-it\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/09\/the-soc-died-of-boredom-fatigue-and-poor-positioning-find-out-how-to-resuscitate-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/Fotolia_73142653_Subscription_Monthly_XXL-Vector-illustration-concept-for-new-business-project-startup.\u00a9-oberonsk.jpg\",\"datePublished\":\"2020-09-01T12:00:08+00:00\",\"description\":\"The exercise of redefining a SOC strategy is a great opportunity to re-mobilize an entire ecosystem under the same banner.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/09\/the-soc-died-of-boredom-fatigue-and-poor-positioning-find-out-how-to-resuscitate-it\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/09\/the-soc-died-of-boredom-fatigue-and-poor-positioning-find-out-how-to-resuscitate-it\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/09\/the-soc-died-of-boredom-fatigue-and-poor-positioning-find-out-how-to-resuscitate-it\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/Fotolia_73142653_Subscription_Monthly_XXL-Vector-illustration-concept-for-new-business-project-startup.\u00a9-oberonsk.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/Fotolia_73142653_Subscription_Monthly_XXL-Vector-illustration-concept-for-new-business-project-startup.\u00a9-oberonsk.jpg\",\"width\":2560,\"height\":2560},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/09\/the-soc-died-of-boredom-fatigue-and-poor-positioning-find-out-how-to-resuscitate-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The SOC died of boredom, fatigue and poor positioning? Find out how to resuscitate it!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8269382799f649bb774493a375d57d31\",\"name\":\"Beno\u00eet Marion\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/benoit-marion\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The SOC died of boredom, fatigue and poor positioning? Resuscitate it!","description":"The exercise of redefining a SOC strategy is a great opportunity to re-mobilize an entire ecosystem under the same banner.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/09\/the-soc-died-of-boredom-fatigue-and-poor-positioning-find-out-how-to-resuscitate-it\/","og_locale":"en_US","og_type":"article","og_title":"The SOC died of boredom, fatigue and poor positioning? Resuscitate it!","og_description":"The exercise of redefining a SOC strategy is a great opportunity to re-mobilize an entire ecosystem under the same banner.","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/09\/the-soc-died-of-boredom-fatigue-and-poor-positioning-find-out-how-to-resuscitate-it\/","og_site_name":"RiskInsight","article_published_time":"2020-09-01T12:00:08+00:00","og_image":[{"width":2560,"height":2560,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/Fotolia_73142653_Subscription_Monthly_XXL-Vector-illustration-concept-for-new-business-project-startup.\u00a9-oberonsk.jpg","type":"image\/jpeg"}],"author":"Beno\u00eet Marion","twitter_misc":{"Written by":"Beno\u00eet Marion","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/09\/the-soc-died-of-boredom-fatigue-and-poor-positioning-find-out-how-to-resuscitate-it\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/09\/the-soc-died-of-boredom-fatigue-and-poor-positioning-find-out-how-to-resuscitate-it\/"},"author":{"name":"Beno\u00eet Marion","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8269382799f649bb774493a375d57d31"},"headline":"The SOC died of boredom, fatigue and poor positioning? Find out how to resuscitate it!","datePublished":"2020-09-01T12:00:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/09\/the-soc-died-of-boredom-fatigue-and-poor-positioning-find-out-how-to-resuscitate-it\/"},"wordCount":942,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/09\/the-soc-died-of-boredom-fatigue-and-poor-positioning-find-out-how-to-resuscitate-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/Fotolia_73142653_Subscription_Monthly_XXL-Vector-illustration-concept-for-new-business-project-startup.\u00a9-oberonsk.jpg","keywords":["continuous improvement","governance","objectives","quality","reporting","SOC","Strategy"],"articleSection":["Cybersecurity &amp; Digital Trust","Ethical Hacking &amp; Incident Response"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/09\/the-soc-died-of-boredom-fatigue-and-poor-positioning-find-out-how-to-resuscitate-it\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/09\/the-soc-died-of-boredom-fatigue-and-poor-positioning-find-out-how-to-resuscitate-it\/","name":"The SOC died of boredom, fatigue and poor positioning? Resuscitate it!","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/09\/the-soc-died-of-boredom-fatigue-and-poor-positioning-find-out-how-to-resuscitate-it\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/09\/the-soc-died-of-boredom-fatigue-and-poor-positioning-find-out-how-to-resuscitate-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/Fotolia_73142653_Subscription_Monthly_XXL-Vector-illustration-concept-for-new-business-project-startup.\u00a9-oberonsk.jpg","datePublished":"2020-09-01T12:00:08+00:00","description":"The exercise of redefining a SOC strategy is a great opportunity to re-mobilize an entire ecosystem under the same banner.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/09\/the-soc-died-of-boredom-fatigue-and-poor-positioning-find-out-how-to-resuscitate-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2020\/09\/the-soc-died-of-boredom-fatigue-and-poor-positioning-find-out-how-to-resuscitate-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/09\/the-soc-died-of-boredom-fatigue-and-poor-positioning-find-out-how-to-resuscitate-it\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/Fotolia_73142653_Subscription_Monthly_XXL-Vector-illustration-concept-for-new-business-project-startup.\u00a9-oberonsk.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2020\/08\/Fotolia_73142653_Subscription_Monthly_XXL-Vector-illustration-concept-for-new-business-project-startup.\u00a9-oberonsk.jpg","width":2560,"height":2560},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2020\/09\/the-soc-died-of-boredom-fatigue-and-poor-positioning-find-out-how-to-resuscitate-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"The SOC died of boredom, fatigue and poor positioning? Find out how to resuscitate it!"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8269382799f649bb774493a375d57d31","name":"Beno\u00eet Marion","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/benoit-marion\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/14133","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/92"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=14133"}],"version-history":[{"count":4,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/14133\/revisions"}],"predecessor-version":[{"id":14146,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/14133\/revisions\/14146"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/14124"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=14133"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=14133"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=14133"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=14133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}