
Sign up to save your podcasts
Or


Welcome back to the Scinary Information Nexus! The inmates are running the asylum this week as Richard steps out, leaving Brazos, Joseph, Hunter, and Mario to take the wheel. With all four of the guys having acted as Security Operations Center (SOC) Managers at some point in their careers, the team leverages their shared history to pull back the curtain on what it really takes to run a true SOC.
The team kicks things off by calling out "reseller" SOCs that rely purely on automated ticket generation, detailing why immediate human action and response times are critical when the defecation meets the oscillation. We also tackle the elephant in the room: AI. Is it a silver bullet that will replace an analyst, or just an expensive tool running on limited context?
Later, the guys debate the merits of hiring generalist analysts versus specialized experts, sharing how correlating data across multiple platforms creates true defense-in-depth. Finally, we offer invaluable, realistic advice for anyone trying to break into the cybersecurity field, and close out by revealing the absolute hardest parts of being a manager.
In this episode, we discuss:
Want to know what it really takes to secure a network? Let's discuss.
Connect with Scinary Cybersecurity:
By Scinary CybersecurityWelcome back to the Scinary Information Nexus! The inmates are running the asylum this week as Richard steps out, leaving Brazos, Joseph, Hunter, and Mario to take the wheel. With all four of the guys having acted as Security Operations Center (SOC) Managers at some point in their careers, the team leverages their shared history to pull back the curtain on what it really takes to run a true SOC.
The team kicks things off by calling out "reseller" SOCs that rely purely on automated ticket generation, detailing why immediate human action and response times are critical when the defecation meets the oscillation. We also tackle the elephant in the room: AI. Is it a silver bullet that will replace an analyst, or just an expensive tool running on limited context?
Later, the guys debate the merits of hiring generalist analysts versus specialized experts, sharing how correlating data across multiple platforms creates true defense-in-depth. Finally, we offer invaluable, realistic advice for anyone trying to break into the cybersecurity field, and close out by revealing the absolute hardest parts of being a manager.
In this episode, we discuss:
Want to know what it really takes to secure a network? Let's discuss.
Connect with Scinary Cybersecurity: