Local IT Security Firm Explains Finer Points of Security Operations

Kieran Upadrasta releases detailed information on security operations and its many branches.

 

9

London, United Kingdom:  Kieran Upadrasta, a cyber security consultant and risk & compliance analysist informs the IT security community of the importance of security operations. Mr. Upadrasta wishes to inform the community of the various branches of security operations as well as some of their important features. Security Operations may contain topics such as:

·         Chain of Custody

·         Foundational Concepts

·         Documentation

·         Media Management

·         Incident Response and Management

·         Investigations

·         Disaster Recovery

Mr. Upadrasta explains that there is are certain fundamentals that are required in order to successfully understand security operations. “It is important that we as an IT Security firm, we understand the importance of Security Operations and its branches. Without them, entire strategies used to combat against information security breaches may never be fully successful.”

Security Operations usually take place in any Information Security Operations Center, “ISOC” or “SOC facility” for short. Typically, these locations communicate with other branches within any company in order to investigate internal and external threats or affairs. For example, the chain of custody is a vital step during any investigation. When defending against charges or attempting to file a case, evidence both physical and electronic much pass through a series of inspections in order to be declared a trustworthy source.

The same can be said about documentation. Ever organization could potentially run into situations where documentation may prove a vital asset. Having detailed documentation can help cover much ground that otherwise would be missing in the event of a security threat. Being able to explain the bigger questions of who, what where, when, and why can prove almost invaluable when protection a company’s vital information. These well documented files could also be used as learning tools and can offer new ways of improving security. 

About Kieran Upadrasta

With, over eighteen years’ experience in business analysis, consulting, security architecture, assessments, threat analysis and risk management, Kieran Upadrasta has worked with many IT security firms including IP Security Services, Nova Consulting, and (ISC)2 London Chapter.  He is an expert in responding to work based incidents and managing major and/or minor problems. His qualifications are as listed on his LinkedIn page, which can be located here. Please contact him via his website for any business related inquiries.

 

Contact: Swathi Gaikwad