This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • COVID-19
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • The Risk Matrix
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Top Cybersecurity Leaders
    • The Security Benchmark Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Women in Security
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Call for Entries
    • Podcasts
    • Videos
      • Cybersecurity & Geopolitical Vodcast
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Store
    • Sponsor Insights
    • Continuing Education
  • INFOCENTERS
    • Put the Smart In Building Security
  • EMAGAZINE
    • eMagazine
    • This Month's Content
    • Contact Us
      • Editorial Guidelines
    • Advertise
    • Subscribe
Home » Global Security Operations Center (GSOC)

Articles Tagged with ''Global Security Operations Center (GSOC)''

video wall SOC

How to build a security operations center on a budget

Dan gundry   vistacom headshot
Dan Gundry
April 1, 2022

Security leaders at small to medium-sized businesses (SMBs) often work with tight budgets to secure their facilities. Removing the complexities that come with large control room integrations allows SMBs to establish mission-critical visualization solutions without breaking the budget.


Read More
Global security operations center

Virtual security operations center protects gaming company assets

January 27, 2022

A popular social gaming company turned to a virtual global security operations center (vGSOC) service when its threat landscape shifted dramatically due to the COVID-19 pandemic.


Read More
adtalem
The Security Benchmark Report – Leader Profiles

Robert Soderberg: Risk-based, business-minded and business enabling

Adtalem Global Education
Maria Henriquez
November 11, 2021

Adtalem Global Education’s Enterprise Safety and Security group have delicately crafted approaches toward safety and security with a focus on continuous improvement to provide community members a safe and secure environment that will allow them to flourish and learn.


Read More
SEC0821-GSOC-Feat-slide1_900px

Three elements of a successful GSOC

For a Global Security Operations Center (GSOC) to be successful in today’s threat landscape, it must include these three key elements in its design.
Patrick Brosnan
August 9, 2021

A useful GSOC is one that understands the problem a company wants to solve so that the data collection requirements and analytics are relevant and staff with the right expertise are in place. If you think that establishing a GSOC is the next step for your enterprise, three key elements will determine its success.


Read More
executives freepik

Security Executive Council welcomes five new security experts

May 3, 2021
The Security Executive Council (SEC) has welcomed Tom Bello, Coral Gehring, Matthew Giese, Bill King, and Tom Mahlik to its faculty of esteemed security experts. SEC subject matter experts and emeritus faculty (former CSOs and CISOs) have excelled in their careers and are eager to transfer their knowledge and competencies to other security leaders.
Read More
SEC0321-Edu-Feat-slide1_900px
Education & Training

The exposure in traditional executive protection

Sec0321 edu slide2 900px
Chris Bullock
Sec0321 edu slide2 900px1
Ashley Ferguson
March 12, 2021

Executive protection is a profession that has an extensive history. This tradecraft began back in late B.C. to 312 A.D., with Roman protection groups that guarded emperors.


Read More
Incorporating automated threat detection in the security operations center (SOC)

Putting the "global" in GSOCs: How to build a comprehensive digital risk protection approach

3johnmichael ohare sales and business development director at cobwebs technologies
Johnmichael O'Hare
February 18, 2021
The complexities of corporate security call for truly global visibility and situational awareness. To get there, GSOCs should consider adopting a program of threat intelligence and digital risk protection (DRP) to keep digital assets safe.
Read More
SEC0221-Edu-Feat-slide1_900px
Education & Training

Maximizing security in repurposed spaces

Ken Poole
February 12, 2021

The COVID-19 pandemic has sparked a unique convergence of security and health, and it’s up to security leaders to keep up and even drive that transformation for their organizations. One of the biggest facility management takeaways from the pandemic has been the need for flexibility within building infrastructures. Thoughtfully implemented solutions and strategies within repurposed spaces will not only safeguard buildings from traditional intruder threats, but also promote a healthy environment for employees and occupants.


Read More
SEC0221-Cover-Feat-slide1_900px
Special Report

The who, what, why and how of the Baker Hughes GITSOC

Energy giant Baker Hughes built its Global Intelligence & Travel Security Operations Center from the ground up, proving its value and relevancy to the greater enterprise amidst a global pandemic.
Maggie shein
Maggie Shein
February 1, 2021

Supporting a goal of empowering regional teams to make the most informed decisions is Baker Hughes’s Global Intelligence & Travel Security Operations Center (GITSOC). When Baker Hughes separated from GE’s oil and gas division in 2019, the event presented a unique opportunity for the Security team to create its own operating model and processes from the ground up to support the organization independently, providing the catalyst for the creation of the GITSOC. Learn about energy giant Baker Hughes’ GITSOC, as well as its value and relevancy to the greater enterprise.


Read More
publicly available information can increase situational awareness for enterprise security

How to use publicly available information to support enterprise security

Babel street jeff chapman headshot
Jeff Chapman
December 22, 2020
Publicly available information (PAI) can give your security enterprise actionable data. Often, however, when an enterprise successfully manages the variety, volume and velocity associated with PAI, that intelligence is often processed in silos. Here's how to ensure your organization can overcome the silos and increase situational awareness for the enterprise.
Read More
Previous 1 2 3 4 5 Next
Subscribe For Free!
  • eMagazine Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • Cloud Security
    Sponsored byConvergeOne

    The Next Frontier of Security in the Age of Cloud

Popular Stories

casino

Casino security on the Las Vegas Strip

police-alert-freepik1170x658v5.jpg

DHS issues national terrorism alert

docs-freepik1170x658v2.jpg

Microsoft Office zero day vulnerability discovered

cyber-password-freepik1170x658v4.jpg

Four ways cybercriminals can hack passwords

domain-name-freepik1170x658v.jpg

4 emerging threats in the domain name landscape

Clear Seas Research

Events

October 28, 2021

Ransomware Readiness: The Rise of Double and Triple Extortions

Ransomware and the propulsion of the extortion economy has rapidly eclipsed into a national priority. Recently, we observed the catastrophic impact of a widescale ransomware attack impacting gas pipelines and raising national gas prices overnight.
July 13, 2022

Making Resilience Decisions Post Pandemic

After surviving the pandemic and moving to a hybrid/remote work model, you may be feeling confident in your operational resilience. 

View All Submit An Event

Poll

Business Travel Security

Does your organization plan to reintroduce business travel in 2022?
View Results Poll Archive

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products

SEC shooter detection webinar

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest enterprise risk and security industry trends.

SUBSCRIBE TODAY!
  • Want More
    • Connect
    • Partners
    • Subscribe
  • Resources
    • Editorial Guidelines
    • Security Group
    • Market Research
    • Custom Content & Marketing Services
    • Survey And Sample
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2022. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing