SIEM platforms collect and aggregate data from various sources, including servers, applications, and network devices, allowing security teams to:
Modern SIEM solutions integrate AI and machine learning to enhance threat detection and automate security workflows, making them a crucial tool for cybersecurity teams
Key features of SOAR include:
SOAR platforms enable security teams to respond to threats faster, improve efficiency, and reduce the burden of manual processes. They are often used alongside SIEM (Security Information and Event Management) systems to enhance overall cybersecurity posture.
SIEM and/or SOAR platforms can be critical to organisations’ cybersecurity strategy by enabling visibility over the ICT environment and the detection of malicious activity. Implemented well, these platforms collect, centralise, and analyse important data that would otherwise be extremely complex and scattered. This helps organisations detect cybersecurity events and incidents to assist defenders intervene early and respond to threats
CISA, in collaboration with the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) and other international and U.S. partners, recently released guidance for organisations seeking to procure Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR) platforms.
outlines how executives can enhance their organization’s cybersecurity framework by implementing these technologies to improve visibility into network activities, enabling swift detection and response to cyber threats.
focuses on how practitioners can quickly identify and respond to potential cybersecurity threats and leverage these technologies to streamline incident response processes by automating predefined actions based on detected anomalies.
offers insights for prioritizing log ingestion into a SIEM, ensuring that critical data sources are effectively collected and analyzed to enhance threat detection and incident response capabilities tailored for organizations.
This guidance should also be read alongside Best practices for event logging and threat detection, which provides high-level recommendations on developing a logging strategy.
If you are interested in finding out more about the IISF, or would like to attend one of our Chapter Meetings as an invited guest, please contact the
IISF Secretary:
By email:
secretary@iisf.ie
By post:
David Cahill
GTS Security,
Exo Building,
North Wall Quay,
Dublin 1,
D01 W5Y2
Enhance your Cybersecurity knowledge and learn from those at the coalface of information Security in Ireland
Invitations for Annual Sponsorship of IISF has now reopened.
Sponsors are featured prominently throughout the IISF.IE website, social media channels as well as enjoying other benefits Read more