Challenges and solutions of SOC: interview with Stefano Marazzi

Defending companies from cyber attacks is increasingly challenging: in this regard, STIM Tech Group has decided to invest in this field, providing its clients with a range of solutions and services for Corporate Cyber Security.

Stefano Marazzi, CEO of STIM Tech Group, talked about this on the pages of Cyber Ducks, a Cyber Security-themed education and outreach platform: below is an excerpt from the interview.

Stefano Marazzi, CEO of STIM Tech Group

How did STIM come about and how was the department dedicated to Cyber Security structured?

Building on a 35-year history, STIM Tech Group is a System Integrator that through the continuous acquisition of new skills has strengthened and expanded the solutions it offers and its client portfolio. To respond to the growing needs of cyber security, we have defined in a specific Business Unit dedicated to Cyber Security..
The new BU, located at the Milan Via Messina office, is structured with a
team of highly qualified experts, including an Internal Competence Center and a modern Research and Development Laboratory (Lab).. The investment also included theimplementation of a 24/7 operational Security Operations Center (SOC)., equipped with advanced technologies to monitor and manage our customers' IT security activities.

How did the idea of a SOC service in STIM come about?

The idea of creating a SOC service in STIM came from the dual needs of a growing market and to meet the demand of some of our customers in the financial sector for IT infrastructure protection. The responsibility given to our Chief Information Security Officer (CISO) Alberto Perini, an expert in the creation and management of SOCs, has made it possible to offer a high-quality IT security monitoring and management service tailored to the needs of our clients.

What is the technological approach of the SOC? What are the services that STIM will focus on?

We have an innovative and holistic approach toward security as a key strategic element for the competitiveness of companies. We combine expertise in Enterprise Network, Physical & Infrastructure Security and IT Managed Services typical of STIM's portfolio, with strategic collaborations with technology partners and the most advanced security technologies to protect our Clients' IT (enterprise) and OT (industrial) infrastructures.
We focus on vertical competencies to address emerging cybersecurity challenges.
One of the main focus areas of our SOC is.
Threat Intelligence, which is the ability to collect, analyze, and interpret threat intelligence in real time. This enables us to detect and mitigate potential threats in a timely manner by providing a proactive monitoring service.
In addition, given the entry into force of the Defense and Offense Response Action (DORA) regulation, our SOC is also focusing on
Red Team services, which enable attack simulations and penetration testing to assess the security of systems and identify any vulnerabilities that need to be corrected.
We are developing specific expertise for
vertical markets such as IoT (Internet of Things) and 5G, which require particularly advanced security solutions because of the unique challenges they present. In this area, our SOC offers targeted services to ensure the protection and security of networks and connected devices, preventing potential attacks and breaches.

How do you see the future of this service?

Evolving cybercrime has strong impacts on the structure of companies; we look to the future with optimism in a necessary path of evolution and growth characterized by the continuous increase in technological complexity. The future of our SOC service will be increasingly oriented toward the as-a-service model, where the team acts proactively in monitoring the digital environment of our customers; a modern security center using logs and SIEM analytics, enriching them with data from endpoints and the network, evolving toward a network-based model between on-prem, cloud, and cloud-native apps, enabling the detection of previously unknown suspicious activity and ensuring the security of corporate information for our customers.

Contact us to learn more: https://www.stimtlc.it/contatti

Back
Back

Securing VPN access and SSH connections with Multi Factor Authentication (MFA): the case of an Italian financial organization

Next
Next

Is your AV Multimedia configuration secure?