The Cyber 11

--

For the start of new football season in Scotland, let’s have a bit of fun, and create our perfect cybersecurity team. We have 11 players for our first team, and now need to define the positions of the 10 out-field players. I would say the perfect formation could be 3:5:2:

  • 3x Risk Analysts (Defence). Defence is solid, and they stay at the back and never stray forward, while communicating continually with their midfield and attack. They continually listen to their goalkeeper, too, and try and identify gaps in the team’s formation. The manager continually shouts orders at them, and they must then listen, but are good solid and dependable players.
  • 5x SOC (Security Operation Centre) Analysts (Midfield). The midfield is able to pick off attackers as the move forward, and also feed the attack. They have done their homework on the opposition and know exactly the types of attacks that they will mount, and are well drilled in coping with these. When required the midfield will move back into defensive positions and create a solid wall of defence in teaming up with the Defence. Their workload is much higher that the defence and attack, and spend a good deal of their team running around after the ball.
  • 2x Threat Hunters (Attack). The attack is able to move back into midfield when required, but will burst out into attack and probe the opposition’s defences. They often shout back at…

--

--

Prof Bill Buchanan OBE FRSE
ASecuritySite: When Bob Met Alice

Professor of Cryptography. Serial innovator. Believer in fairness, justice & freedom. Based in Edinburgh. Old World Breaker. New World Creator. Building trust.