Loading...

Media is loading
 

Paper Type

ERF

Abstract

This paper evaluates activities related to the creation and operation of a Security Operations Center (SOC). This SOC is owned by a business college and is run with the cooperation of the university’s information technology department. The creation, nature, and evolution of relationships between the SOC and its external partners are explored and defined. A National Institute of Standards and Technology (NIST) Cybersecurity framework is used as a context and Social Exchange Theory is used as a lens for interpretation and explanation.

Share

COinS
 
Aug 10th, 12:00 AM

Defining Roles, Relationships, and Value in Cybersecurity Operations

This paper evaluates activities related to the creation and operation of a Security Operations Center (SOC). This SOC is owned by a business college and is run with the cooperation of the university’s information technology department. The creation, nature, and evolution of relationships between the SOC and its external partners are explored and defined. A National Institute of Standards and Technology (NIST) Cybersecurity framework is used as a context and Social Exchange Theory is used as a lens for interpretation and explanation.

When commenting on articles, please be friendly, welcoming, respectful and abide by the AIS eLibrary Discussion Thread Code of Conduct posted here.