征稿已开启

查看我的稿件

注册已开启

查看我的门票

已截止
活动简介

International Conference on Security Operation Centres, Automation, Remediation and Optimisation (SOC 2016) is an international referred conference dedicated to the advancement of Cyber Security Operations Centres, Network Operations Centres, Remediation and Optimisation. We welcome new and innovative contributions that provide insight to theoretical underpinnings, foundational research, methods and practical implementation of cyber security operations centres, advances in the implementation, design and systems optimisation, and security vulnerability assessments and threat profiling. 

The aim of the SOC 2016 is to encourage participation and promotion of collaborative scientific, industrial and academic inter-workings among individual researchers, practitioners, members of existing associations, academia, standardisation bodies, and including government departments and agencies. The purpose is to build bridges between academia and industry, and to encourage interplay of different cultures.

SOC 2016 invites researchers and industry practitioners to submit papers that encompass principles, analysis, design, methods and applications. All submitted papers are independently peer-reviewed.

征稿信息

征稿范围

Original papers are invited on recent advances in Cyber Security Operations Centres, Network Operations Centres, Vulnerability Assessments and Security Optimisation and Remediation. The main themes in SOC 2016 include but not limited to:

  • Cyber Security Operations Centres (Cyber SOC)

  • Cyber SOC Designs

  • Principles and Operations

  • Design Requirements

  • SOC Security Operating Procedures (SOC SyOPs)

  • Architectures and Design Considerations

  • Implementation of SOC Centres

  • Monitoring and Security Analysis

  • Security Information and Event Management (SIEM)

  • Log Analysis & Analytics

  • IDS/IPS & Firewall Administration

  • Security Mechanisms and Protocols (DNS, FTP, TLS, SSL, VPN etc)

  • Alerting and Event Prioritisation

  • Analysis Tools and Techniques

  • Incident Triage

  • Incident Analysis, Management, Reporting and Escalation

  • Management Reports and Management Information (MI) Reports

  • Coordination and Containment

  • Collaboration and Incident Investigation

  • Model of Operations

  • Intelligence Interfaces

  • Asset Management, Prioritisation and Categorisation

  • Investigation & Forensic Readiness

  • Network Operations Centre (NOC)

  • Functions of NOCs

  • Design Principles

  • Design Architectures and Design Requirements

  • Monitoring and Analysis

  • Coordination

  • Incident Response & Handling

  • Incident Management

  • Operations Management

  • Models of Operations

  • System Interfaces and Automation

  • Asset Management

  • Data Leak Prevention (DLP)

  • Denial and Distributed Denial of Service (DDoS)

  • Vulnerability Management

  • Vulnerability Scanning, Ranking and Prioritisation

  • IT Health Checks (ITHC)

  • Vulnerability Analysis

  • Vulnerability Management

  • Asset Management & Configuration Management Database

  • Business Information Systems Management

  • Asset Classification, Categorisation & Prioritisation

  • Remediation and Optimisation

  • Remedial Action Plans

  • Risk Management

  • Business Process Optimisation

  • Security Management

  • Policy and Standards Compliance

  • Vulnerability Management

  • Accreditation

  • Security Assurance and Certification

  • Process, Procedure and Standardisation

  • Global IT Outsourcing

  • Supplier Management

留言
验证码 看不清楚,更换一张
全部留言
重要日期
  • 会议日期

    11月09日

    2016

    11月11日

    2016

  • 11月11日 2016

    注册截止日期

移动端
在手机上打开
小程序
打开微信小程序
客服
扫码或点此咨询