Fortinet - these are the issues facing SOC teams today and tomorrow, and how best to mitigate the risks

Security
(Image credit: Shutterstock) (Image credit: Shutterstock)

The threat landscape is always evolving, but with this evolution comes a number of challenges that make running a Security Operations Center (SOC) harder than ever before, experts have declared.

New technologies emerging, workplace organization has shifted rapidly, and new devices are constantly being pumped into the market - so what are the major challenges facing SOC, and how can businesses mitigate the risks presented by an ever evolving threat landscape?

The big issues

At the recent Fortinet Convergence23 conference, John Maddison, Fortinet's Chief Marketing Officer and Executive Vice President for Product Strategy, explained that cybersecurity teams no longer have control over the decisions they make surrounding their security architecture. Since Covid-19, more businesses than ever have a hybrid workforce and employees are hesitant to return to offices. This has spread the attack surface available to threat actors to unprecedented levels.

Hybrid workers also require their own devices, applications and access to storage, presenting a whole new host of security risks. Each application used is a potential avenue for cybercriminals to intrude and each device needs a network connection into the business. 

As Dr Carl Windsor stated, “There is no longer a network edge.”

There are also significant limits facing SOC teams. As recent studies have shown, many teams are understaffed and therefore are experiencing burnout at a much higher rate than other industries.

Kash Valji, the company's Director of Consulting Systems Engineering, was keen to highlight that devices and applications are becoming increasingly complex and require individual configuration with security products to provide the best protection. But with the current cyber skills gap, many firewalls are being configured incorrectly, adding additional vulnerabilities to the security infrastructure.

On many occasions when a security breach occurs a firewall has logged the potential intrusion, but SOC teams are simply too overwhelmed, too understaffed, or lack the necessary expertise to neutralize a threat before damage occurs.

The solutions

Elsewhere at the event, Fortinet Field CISO, Ricardo Ferreira and Vice President of Products, Nirav Shah, explained that security teams need to understand a number of factors in order to function in the future.

The first is that there is no longer a network edge. You can no longer look at the security infrastructure and define its perimeter. From devices, to applications, to cloud hosted services - nothing is safe. Each access point needs its own robust firewall, and endpoint protection is needed for every device.

The second is to employ a Zero Trust network; access is only granted to each device after secure identity authentication; the access granted by each device or application is limited within the network to only what is required; adjust the network in real time to grant and revoke access on a per device basis.

The third is to understand that security is no longer a compliance issue. The viability and survival of a business depends on how secure it is, therefore the security strategy should integrate heavily with the business strategy. The size of the business is equal to the size of the necessary security solution.

More from TechRadar Pro

Benedict Collins
Staff Writer (Security)

Benedict has been writing about security issues for over 7 years, first focusing on geopolitics and international relations while at the University of Buckingham. During this time he studied BA Politics with Journalism, for which he received a second-class honours (upper division), then continuing his studies at a postgraduate level, achieving a distinction in MA Security, Intelligence and Diplomacy. Upon joining TechRadar Pro as a Staff Writer, Benedict transitioned his focus towards cybersecurity, exploring state-sponsored threat actors, malware, social engineering, and national security. Benedict is also an expert on B2B security products, including firewalls, antivirus, endpoint security, and password management.

Read more
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
An abstract image of a lock against a digital background, denoting cybersecurity.
Why AI is playing a growing role in helping SOC teams keep up with cyber threats
Abstract image of cyber security in action.
It’s time to catch up with cyber attackers
Padlock against circuit board/cybersecurity background
Preparing for the future of cybersecurity with next-gen SIEM
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Don’t let holidays be your cybersecurity downfall
An image of network security icons for a network encircling a digital blue earth.
Why effective cybersecurity is a team effort
Latest in Pro
Finger Presses Orange Button Domain Name Registration on Black Keyboard Background. Closeup View
I visited the world’s first registered .com domain – and you won’t believe what it’s offering today
Racks of servers inside a data center.
Modernizing data centers: an efficient path forward
Dr. Peter Zhou, President of Huawei Data Storage Product Line
Why AI commonization is so important for business intelligent transformation and what Huawei’s data storage has to offer
Wix automation
The world's leading website builder aims to save businesses time with new tool
Data Breach
Thousands of healthcare records exposed online, including private patient information
China
Juniper patches security flaws which could have let hackers take over your router
Latest in Features
Disappointed by The Electric State? Here's 4 reasons you should watch Tales From the Loop on Prime Video
Close up of PS5 DualSense controller leaning on a PS5
5 reasons your PS5 needs a VPN
Warhammer 40,000: Space Marine 2
With discounts of up to 95%, these are the biggest deals I've managed to find in the Steam Spring Sale
The cast of The Parenting
The Parenting is Max's #1 most-watched movie but it has frightening reviews – here are 3 better horror films with over 90% on Rotten Tomatoes
Dr. Peter Zhou, President of Huawei Data Storage Product Line
Why AI commonization is so important for business intelligent transformation and what Huawei’s data storage has to offer
Asif Ali Saagar Shaikh and Poorna Jagannathan stand in line with a convenience store backdrop. Poorna is standing at the front with her arms on her hips in Deli Boys.
Hulu has 36 new shows this month – here are 3 you should watch this weekend with over 89% on Rotten Tomatoes