Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementSecurity Leadership and Management

Best Practices for Setting Up Your GSOC

By Christopher Deringer
Christopher Deringer

Christopher Deringer

March 1, 2017

Whether you’re establishing your firm’s first Global Security Operations Center (GSOC), including a co-located Network Security Operations Center (NSOC) or refreshing your current GSOC’s and/or NSOC’s capabilities, here are my recommendations for success.

Interview your stakeholders on what they expect from their GSOC. This may include your organization’s C-suite executives, human resources, general counsel, IT, the heads of all your business units and anyone else who should be expecting support from your team. If this position is staffed at your firm, your chief information security officer (CISO) can be an invaluable ally in this pursuit; collaboration during these first efforts will greatly improve integration of your physical and information and cyber security efforts.

Educate all stakeholders on what a GSOC can and should do for them during these interviews. Inevitably, some colleagues will not be fully aware of the wide range of capabilities a GSOC can cover. This is your chance to connect with your business leaders, manage expectations, and build relationships by discussing these critical elements – as well as how they can integrate with their NSOC counterparts.

 

Typical GSOC responsibilities

  • Facility security, access control and overall security systems administration

  • Incident management, up to and including crisis management and crisis communications

  • Duty of care, including executive security and travel security for all employees

  • Business resilience, domestically and globally, including disaster recovery

  • Global situational awareness of potential impacts to the business around the world

  • Compliance

  • Investigations

  • Additional support to other parts of the organization; often the GSOC is the only part of the business that is open 24/7

 

Compile all desired capabilities across all program areas, then identify and price the resources needed to execute. This is your prelude to creating budgets for basic, robust and best-in-class GSOC options – using primary and secondary resource options ranked by quality and cost – for your executives to consider. Resources should include: infrastructure and equipment i.e. real estate with redundant utilities, communications and software, data sources such as risk analysis or weather information, and personnel capable of designing and executing clear security procedures.

Prioritize your GSOC resource options according to the outcomes you want to achieve over time. A basic GSOC may serve the needs of your organization at present, but as your business grows, so too must its risk management program. Your budget decisions should reflect this in the short, medium and long term. For example, while it may be perfectly acceptable to utilize third-party providers for interpreters and political risk analysts at present, if your firm expands significantly you may want to add dedicated resources in the future so they are more readily available as they are more frequently needed.

Allocate the approved resources, build your GSOC (and accompanying NSOC) and go live! As you manage your center(s), ensure that you work towards your short-term (e.g. six months), medium-term (e.g.one year) and long-term goals (longer than one year) in terms of your program’s abilities. As your business and the industry it serves evolve in both complexity and risk, so too should your procedures, through consistent internal communications with stakeholders that spur continuous improvement and help ensure a successful GSOC.

 

Read more about GSOCs in our March cover story: Creating the GSOC: 4 Leading Examples of Successful Security Operations Centers

KEYWORDS: global security Global Security Operations Center (GSOC) security monitoring Security Operation Centers security strategy

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Christopher Deringer is Associate Director with Control Risks, an independent, specialist risk consultancy.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Encryption Future - Security Magazine

    Best practices for protecting your data from ransomware

    See More
  • global-enews

    4 Best Practices for Global Integration

    See More
  • Corning Incorporated staff; security operations center, international security, security leadership, security command center

    The Risk Room: Building the Right GSOC for Your Business

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing