SlideShare a Scribd company logo
SESSION ID:
#RSAC
Emma Smith
PULLING OUR SOCS UP
VODAFONE GROUP AT RSAC 2018
AIR-R04
Group Technology Security Director
Vodafone Group Plc
Andy Talbot
Global Head of Cyber Defence
Vodafone Group Plc
# R S A C
Pulling our SOCs up
# R S A C
Introduction About Vodafone, Vision, Target State
Approach More than a SOC, Threat Scenarios, Tech Choices, Culture
Pulling our SOCs up
Key Messages Learnings and Benefits, Future
# R S A C
Operating Countries
Partner Markets /
Enterprise only
A bit about Vodafone
Mobile
Customers
529m
Worlds 2nd largest
network
Minutes of
mobile calls
4.4bn
Every 24hrs
IoT
Connections
64m
Globally
M-Pesa financial
transactions
20m
Every 24hrs
Customer
Traffic
2.4Tbps
At any time
Cyber Security
Professionals
870+
Local & Group
# R S A C
# R S A C
a secure digital future
for our customers
The Vodafone Security Vision
# R S A C
Strong Security
Basics
Customer Security
Cyber Defence
• Threat Intelligence
• Connect and Detect
• Discovery and Hunting
• Security Response
• People, Process & Technology
Risk, People &
Culture
Future
Focused
Security Strategy 2020
# R S A C
From To
Our Target State
Stakeholders
Aware Advocates
Technology
Size mattered
Controlled and
consistent coverage
People
External reliance Sustainable capability
Approach
Technology led Risk and threat led
# R S A C
Security MonitoringActive Monitoring, Hunting & Analytics
Threat Intelligence
Cyber Defence (More than just a SOC)
Security Testing
Security Infrastructure Services
Centre of Excellence
Forensics and eDiscovery
Incident Management
Prevent Detect Respond
# R S A C
System
Compromise
Phishing
Social
Engineering
Malicious
Comms
Unauthorised
Access
User Access
Management
Potential Policy
Violation
Denial of
Service
Compliance or
Legal (PCI)
Web Monitoring
1st Evolution
Threat Scenarios
# R S A C
Connect and Detect Data Feeds
Unifying focus for all stakeholders to provide these
Device Types under a Connect and Detect programme
Website
Protection
IDS/IPS
Domain
Controllers
Endpoint
Protection
Web Traffic
Management
Remote
Access
Solution
IP
Management
Firewalls
DNS
Firewall
DDoS
# R S A C
Cyber Risk Line of Sight
Business
Risks
Cyber and
Information
Security at
Number 1
Line of sight
Data Feeds
Only onboard
what’s needed for
the detection rules
Alerts
Linking alerts back
to threat vectors
and business risk
Detection Rules
Cyber attack
scenarios dictate
detection rules
Cyber Attack
Methods
Environmental
analysis to determine
specific cyber attack
methods
Evolve
Review post
incident and evolve
attack scenarios
Coverage
Ensure critical
assets are
protected and
providing data
feeds
Cyber Threat
Landscape
All potential threat
vectors, prioritized
by frequency and
impact
Control
Framework
Mitigation through
the Cyber Security
Control
Framework
# R S A C
Malicious,
Compromised or
Exploited
Software
Vulnerability
Exploitation
Account
Hijack
Social Engineering
Denial of
Service
Website
Attacks
Access
Abuse
Telecoms
Interception
Next Evolution
Cyber Attack Method Groups
# R S A C
Tough Tech Choices
Standalone SIEMSIEM
Integrated SIEM evolution
& Big Data
Advanced analytics &
cognitive learning
Incident ManagementIM
Follow-the-sun and
enhanced workflow with
technology
Automation
Fragmented
capability
TI
Centralized Threat
Intelligence team
Enhanced insight with
technology
# R S A C
Leadership, Culture & Team
# R S A C
People & Culture
Focus on
diversity
Neutral
Language
Personal
Network
Pay
reviews
2 female
candidates
Set a
target
Apprentices
& Graduates
# R S A C
Security with PACE : Our Values
Vodafone
Security Values
PACE
We deliver at the right speed to
achieve the best results for our
customer, and we do this by
operating swiftly and in an agile
manner
Passionate
and have a thirst to make a
difference, to empower our
teams, to enable our customers
Authentic
and transparent, focused on
achieving the right results in the
right way. We act with integrity
and strive to be our best self
Curious
and eager to learn, to innovate
in the way we do things and we
challenge, never accepting the
status quo
Expert
and knowledge hungry. Our
understanding of security is felt
by our customers, colleagues
and our team. We are open and
share knowledge
# R S A C
Detection rules tied to threats which
enables quicker understanding and
context
Playbooks and automation
free up human effort
Learning and Benefits
Always
learning
16 Vodafone companies
connected in one year
30% Gender Diversity and
52% of last year’s external
hires were women
>40% events of interest detected
that we wouldn’t have otherwise
seen
Created unified focus, pace
and momentum
Increase in people
reporting
unusual activity
7 times more data and each piece of
data counts for more
Drive
consistency in
approach
Be risk and
threat led
Create
momentum
with your
advocates
Set
ambitious
goals
Keep the
technology
plan simple
Do the basics
well
Shape core
values &
cherish
diversity
Build
integrated
end to end
# R S A C
Implement new
technologies
Balance between SIEM
and big data analytics
Embrace learning
By collaborating,
sharing, curiosity and
embracing failure
Keep connecting
and detecting
Beyond IT: Networks,
5G, Cloud and IoT
Invest in our people
Develop the things that
bind us together - our
people and our culture
Be efficient and
automate
Automate routines and
empower people
In the future, we will…
# R S A C
Apply Pulling Our SOCs Up
Next week
Ask yourself; “Can I link my SOC activity back to
my business risks?”
Next three months
Ask yourself; “Do my Cyber Security plans have
aspects covering people, culture, processes and
technology?”
Next six months
Ask yourself; “Do I have senior advocates for
my Cyber Security plans?”

More Related Content

PDF
Soc 2030-socs-are-broken-lets-fix- them
PDF
Insights from-NSAs-cybersecurity-threat-operations-center
PDF
Threat intel- -content-curation-organizing-the-path-to-successful-detection
PDF
Predicting exploitability-forecasts-for-vulnerability-management
PDF
Incident response-in-the-cloud
PDF
The Rise of the Purple Team
PDF
DON'T Use Two-Factor Authentication...Unless You Need It!
PDF
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
Soc 2030-socs-are-broken-lets-fix- them
Insights from-NSAs-cybersecurity-threat-operations-center
Threat intel- -content-curation-organizing-the-path-to-successful-detection
Predicting exploitability-forecasts-for-vulnerability-management
Incident response-in-the-cloud
The Rise of the Purple Team
DON'T Use Two-Factor Authentication...Unless You Need It!
The Seven Most Dangerous New Attack Techniques, and What's Coming Next

What's hot (20)

PDF
CLOUD SECURITY ESSENTIALS 2.0 Full Stack Hacking & Recovery
PDF
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
PDF
Cloud Breach – Preparation and Response
PDF
Applying Auto-Data Classification Techniques for Large Data Sets
PDF
Threat Intelligence Is Like Three Day Potty Training
PDF
Confusion and deception new tools for data protection
PDF
Realities of Data Security
PDF
Dreaming of IoCs Adding Time Context to Threat Intelligence
PDF
Soc analyst course content
PDF
Orchestrating Software Defined Networks To Disrupt The Apt Kill Chain
PDF
Attacks on Critical Infrastructure: Insights from the “Big Board”
PDF
The Good, the Bad and the Ugly of the Ultrasonic Communications Ecosystem
PDF
Making Threat Intelligence Actionable Final
PDF
Rise of the Hacking Machines
PDF
Introduction and a Look at Security Trends
PDF
How To Avoid The Top Ten Software Security Flaws
PDF
IOCs Are Dead—Long Live IOCs!
PDF
Applied cognitive security complementing the security analyst
PDF
Implementing An Automated Incident Response Architecture
PDF
Partnership with a CFO: On the Front Line of Cybersecurity
CLOUD SECURITY ESSENTIALS 2.0 Full Stack Hacking & Recovery
Wireless Infusion Pumps: Securing Hospitals’ Most Ubiquitous Medical Device
Cloud Breach – Preparation and Response
Applying Auto-Data Classification Techniques for Large Data Sets
Threat Intelligence Is Like Three Day Potty Training
Confusion and deception new tools for data protection
Realities of Data Security
Dreaming of IoCs Adding Time Context to Threat Intelligence
Soc analyst course content
Orchestrating Software Defined Networks To Disrupt The Apt Kill Chain
Attacks on Critical Infrastructure: Insights from the “Big Board”
The Good, the Bad and the Ugly of the Ultrasonic Communications Ecosystem
Making Threat Intelligence Actionable Final
Rise of the Hacking Machines
Introduction and a Look at Security Trends
How To Avoid The Top Ten Software Security Flaws
IOCs Are Dead—Long Live IOCs!
Applied cognitive security complementing the security analyst
Implementing An Automated Incident Response Architecture
Partnership with a CFO: On the Front Line of Cybersecurity
Ad

Similar to Pulling our-socs-up (20)

PDF
From SIEM to SOC: Crossing the Cybersecurity Chasm
PPTX
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
PPTX
Cyber Defense Matrix: Reloaded
PPTX
Cybersecurity model and top cloud security controls for product development e...
PPSX
Plataforma de Operação e Simulação Cibernética
PDF
Journey to the Center of Security Operations
PPTX
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
PDF
DevSecOps in Baby Steps
PDF
DevSecOps in Baby Steps
PPTX
Vodafone security priorities in Greece
PPTX
Information Security, Cybercrime and technology futures allowing you to get a...
PDF
Rothke secure360 building a security operations center (soc)
PDF
Hardening the cloud : Assuring agile security in high-growth environments
PPTX
Is the SOC working as a viable business model (or security model)?
PPTX
Co3's Annual Review & Predictions Webinar
PDF
Introducing a Security Program to Large Scale Legacy Products
PDF
Aujas incident management webinar deck 08162016
PDF
The global cyber security market
PPTX
SOC: Use cases and are we asking the right questions?
PDF
Bert Heitink - Technical Insights for the SOC as Technical Centre for IT Secu...
From SIEM to SOC: Crossing the Cybersecurity Chasm
SAL-DR-01-ELC 10 Understanding the SOC Audience.pptx
Cyber Defense Matrix: Reloaded
Cybersecurity model and top cloud security controls for product development e...
Plataforma de Operação e Simulação Cibernética
Journey to the Center of Security Operations
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
DevSecOps in Baby Steps
DevSecOps in Baby Steps
Vodafone security priorities in Greece
Information Security, Cybercrime and technology futures allowing you to get a...
Rothke secure360 building a security operations center (soc)
Hardening the cloud : Assuring agile security in high-growth environments
Is the SOC working as a viable business model (or security model)?
Co3's Annual Review & Predictions Webinar
Introducing a Security Program to Large Scale Legacy Products
Aujas incident management webinar deck 08162016
The global cyber security market
SOC: Use cases and are we asking the right questions?
Bert Heitink - Technical Insights for the SOC as Technical Centre for IT Secu...
Ad

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
PDF
Cyber Defense Matrix Workshop - RSA Conference
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
PDF
Securing AI - There Is No Try, Only Do!.pdf
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
PDF
Keynote : Presentation on SASE Technology
PDF
Keynote : AI & Future Of Offensive Security
PDF
Redefining Cybersecurity with AI Capabilities
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
PDF
Finetuning GenAI For Hacking and Defending
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Cyber Defense Matrix Workshop - RSA Conference
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Securing AI - There Is No Try, Only Do!.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Keynote : Presentation on SASE Technology
Keynote : AI & Future Of Offensive Security
Redefining Cybersecurity with AI Capabilities
Demystifying Neural Networks And Building Cybersecurity Applications
Finetuning GenAI For Hacking and Defending
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf

Recently uploaded (20)

PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Cloud computing and distributed systems.
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Electronic commerce courselecture one. Pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Machine learning based COVID-19 study performance prediction
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Approach and Philosophy of On baking technology
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Dropbox Q2 2025 Financial Results & Investor Presentation
NewMind AI Monthly Chronicles - July 2025
Advanced methodologies resolving dimensionality complications for autism neur...
Cloud computing and distributed systems.
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Building Integrated photovoltaic BIPV_UPV.pdf
Electronic commerce courselecture one. Pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Understanding_Digital_Forensics_Presentation.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Review of recent advances in non-invasive hemoglobin estimation
Machine learning based COVID-19 study performance prediction
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Approach and Philosophy of On baking technology
Reach Out and Touch Someone: Haptics and Empathic Computing
Encapsulation_ Review paper, used for researhc scholars
Digital-Transformation-Roadmap-for-Companies.pptx
Chapter 3 Spatial Domain Image Processing.pdf

Pulling our-socs-up

  • 1. SESSION ID: #RSAC Emma Smith PULLING OUR SOCS UP VODAFONE GROUP AT RSAC 2018 AIR-R04 Group Technology Security Director Vodafone Group Plc Andy Talbot Global Head of Cyber Defence Vodafone Group Plc
  • 2. # R S A C Pulling our SOCs up
  • 3. # R S A C Introduction About Vodafone, Vision, Target State Approach More than a SOC, Threat Scenarios, Tech Choices, Culture Pulling our SOCs up Key Messages Learnings and Benefits, Future
  • 4. # R S A C Operating Countries Partner Markets / Enterprise only A bit about Vodafone Mobile Customers 529m Worlds 2nd largest network Minutes of mobile calls 4.4bn Every 24hrs IoT Connections 64m Globally M-Pesa financial transactions 20m Every 24hrs Customer Traffic 2.4Tbps At any time Cyber Security Professionals 870+ Local & Group # R S A C
  • 5. # R S A C a secure digital future for our customers The Vodafone Security Vision
  • 6. # R S A C Strong Security Basics Customer Security Cyber Defence • Threat Intelligence • Connect and Detect • Discovery and Hunting • Security Response • People, Process & Technology Risk, People & Culture Future Focused Security Strategy 2020
  • 7. # R S A C From To Our Target State Stakeholders Aware Advocates Technology Size mattered Controlled and consistent coverage People External reliance Sustainable capability Approach Technology led Risk and threat led
  • 8. # R S A C Security MonitoringActive Monitoring, Hunting & Analytics Threat Intelligence Cyber Defence (More than just a SOC) Security Testing Security Infrastructure Services Centre of Excellence Forensics and eDiscovery Incident Management Prevent Detect Respond
  • 9. # R S A C System Compromise Phishing Social Engineering Malicious Comms Unauthorised Access User Access Management Potential Policy Violation Denial of Service Compliance or Legal (PCI) Web Monitoring 1st Evolution Threat Scenarios
  • 10. # R S A C Connect and Detect Data Feeds Unifying focus for all stakeholders to provide these Device Types under a Connect and Detect programme Website Protection IDS/IPS Domain Controllers Endpoint Protection Web Traffic Management Remote Access Solution IP Management Firewalls DNS Firewall DDoS
  • 11. # R S A C Cyber Risk Line of Sight Business Risks Cyber and Information Security at Number 1 Line of sight Data Feeds Only onboard what’s needed for the detection rules Alerts Linking alerts back to threat vectors and business risk Detection Rules Cyber attack scenarios dictate detection rules Cyber Attack Methods Environmental analysis to determine specific cyber attack methods Evolve Review post incident and evolve attack scenarios Coverage Ensure critical assets are protected and providing data feeds Cyber Threat Landscape All potential threat vectors, prioritized by frequency and impact Control Framework Mitigation through the Cyber Security Control Framework
  • 12. # R S A C Malicious, Compromised or Exploited Software Vulnerability Exploitation Account Hijack Social Engineering Denial of Service Website Attacks Access Abuse Telecoms Interception Next Evolution Cyber Attack Method Groups
  • 13. # R S A C Tough Tech Choices Standalone SIEMSIEM Integrated SIEM evolution & Big Data Advanced analytics & cognitive learning Incident ManagementIM Follow-the-sun and enhanced workflow with technology Automation Fragmented capability TI Centralized Threat Intelligence team Enhanced insight with technology
  • 14. # R S A C Leadership, Culture & Team
  • 15. # R S A C People & Culture Focus on diversity Neutral Language Personal Network Pay reviews 2 female candidates Set a target Apprentices & Graduates
  • 16. # R S A C Security with PACE : Our Values Vodafone Security Values PACE We deliver at the right speed to achieve the best results for our customer, and we do this by operating swiftly and in an agile manner Passionate and have a thirst to make a difference, to empower our teams, to enable our customers Authentic and transparent, focused on achieving the right results in the right way. We act with integrity and strive to be our best self Curious and eager to learn, to innovate in the way we do things and we challenge, never accepting the status quo Expert and knowledge hungry. Our understanding of security is felt by our customers, colleagues and our team. We are open and share knowledge
  • 17. # R S A C Detection rules tied to threats which enables quicker understanding and context Playbooks and automation free up human effort Learning and Benefits Always learning 16 Vodafone companies connected in one year 30% Gender Diversity and 52% of last year’s external hires were women >40% events of interest detected that we wouldn’t have otherwise seen Created unified focus, pace and momentum Increase in people reporting unusual activity 7 times more data and each piece of data counts for more Drive consistency in approach Be risk and threat led Create momentum with your advocates Set ambitious goals Keep the technology plan simple Do the basics well Shape core values & cherish diversity Build integrated end to end
  • 18. # R S A C Implement new technologies Balance between SIEM and big data analytics Embrace learning By collaborating, sharing, curiosity and embracing failure Keep connecting and detecting Beyond IT: Networks, 5G, Cloud and IoT Invest in our people Develop the things that bind us together - our people and our culture Be efficient and automate Automate routines and empower people In the future, we will…
  • 19. # R S A C Apply Pulling Our SOCs Up Next week Ask yourself; “Can I link my SOC activity back to my business risks?” Next three months Ask yourself; “Do my Cyber Security plans have aspects covering people, culture, processes and technology?” Next six months Ask yourself; “Do I have senior advocates for my Cyber Security plans?”