IBM Builds 'SOC on Wheels' to Drive Cybersecurity Training
A tractor trailer housing a Cyber Tactical Operation Center will travel throughout the US and Europe for incident response training, security support, and education.
IBM Security is taking incident response training on the road with the IBM X-Force Command Cyber Tactical Operation Center (C-TOC), a tractor trailer housing a fully functional security operations center.
The company opened its commercial cyber range, X-Force Command, in Cambridge, Massachusetts, in Nov. 2016. Its mission was to simulate actual cyberattacks so corporate security experts, C-suite execs, and other business teams could gauge their preparedness (or lack thereof) to respond to an actual breach. In two years, about 2,000 people have tested their response skills in the cyber range, which has a waiting list of eight months.
Now, IBM is putting the same concept on wheels.
IBM X-Force's C-TOC accommodates 24 operators, analysts, and incident command center staff. The 23-ton trailer, modeled after military and first responders' command centers, can expand to the width of three Humvees and packs 20 workstations, 20,000 feet of networking cable, and two satellite dishes. An onboard data center is built on a 100TB solid-state disk array, cooled with 10+ tons of cooling capacity, and the full unit runs on 47kW of self-generating power.
"We built the IT environment of a Fortune 500 company and put it on a truck," said Caleb Barlow, vice president of threat intelligence at IBM Security, in a tour of the space
The C-TOC serves three purposes, he explained. First and foremost is response training: companies can use the center to train employees on how they should respond to attacks by simulating real-life scenarios. Rather than limit education to technical response, businesses can bring in executives, HR, comms teams – anyone who has a role in responding to a breach.
Companies with the ability to respond to incidents within 30 days can save more than $1 million after a data breach, according to data in IBM's 2018 Cost of a Data Breach Study. But less than 25% companies surveyed report having a coordinated incident response plan.
"This is built on the fundamental thesis that learning how to make a decision in a crisis matters," Barlow said. Generally, he added, when teams are put into a simulation and forced to make decisions, any underlying problems that could derail incident response quickly surface.
Chris Crummey, executive director of IBM X-Force Command, said one of the key lessons learned among companies who test their response skills is they need to be more proactive in threat hunting while investigating an incident. "Customers want to put out fires, but in reality, you have to figure out if the fires are related," he explained. Another common weakness is neglecting to look for places where security problems commonly begin.
"The most mature customers, they go hunting for their blind spots," Crummey added
Response capabilities aside, IBM also intends for the C-TOC to be an on-demand mobile operations center at sporting events or other large-scale gatherings where extra security resources may be needed, Barlow noted.
When it isn't being used for incident response training or supplemental security support, IBM plans to use the C-TOC to drive education and awareness. The center will travel to universities and industry events to teach the incoming generation of workers about security careers.
"We want to provide the educational opportunity, and inspirational opportunity, to get more people in this field," he said.
The C-TOC will be traveling the United States for the next month, visiting client sites, government facilities, and schools. Then it's onward to Europe, where it will work with clients and stop by events in countries across the EU throughout 2019.
Source darkreading
Industry: Cyber Security News

Latest Jobs
-
- SOC Manager. SC Clearance. Immediate opportunity.
- Unknown
- N/A
-
Permanent SOC Manager. SC cleared / clearable, London / Birmingham. SOC Manager needed to replace a SOC contractor I placed into a client who is due to complete their assignment at the end of March. The ability to achieve SC clearance is essential. Looking for someone that is a blend of strategic stakeholder engagement with strong technical skills. The role will sit in a relatively new SOC environment. The position is to setup, implementation and management of resources to help with the initial and on-going stages of a new SOC. Experience engaging with and managing client stakeholder relationships as well as 3rd party relationships is critical. The role will involve; setting up, implementing and fine tuning the various initial stages of a SOC environment. Experience establishing and building out technical process / operational capability, managing of technical teams (analysts, engineers and architects, creation of policy / playbooks, fine turning is key. SPLUNK is the tooling of choice… Interviewing immediately. Set up a call with me today on https://calendly.com/chris-holt/arranged-call-with-chris-holt-soc-manager-role Direct contact details Chris.Holt@dclsearch.com or 07884666351
-
- Security Analyst. Financial Services. UK. Permanent
- Unknown
- N/A
-
CH7863 Security Analyst. End User . Financial Services Security Analyst needed to monitor and manage a security suite of tools within an End User environment. The Security Analyst will be responsible monitoring, configuring, fine tuning, incident management and generally improving the security tool capability. Specific experience with CyberArk, Tripwire Log Center and Tripwire Enterprise is highly desirable). Current experience with Vulnerability management and penetration testing is highly desirable. Specifically the ability to effectively manage 3rd party pen tests. You will be working within a specialist security team reporting to the CISO. Experience working within an end user environment within financial services is highly desirable. Flexible location. This is an exclusive role to DCL Search & Selection. To book a call please use my Calendy link https://calendly.com/chris-holt/arranged-call-with-chris-holt-soc-role-
-
- DevSecOps - Security design / review consultant. SC Clearance. London
- London
- N/A
-
CH7858 London £70,000 DevSecOps - Security design / review consultant. DevSecOps - Security design / review consultant will ensure that newly created, public facing apps are secure by design and by default by aligning them to current / best practice security policies and standards into the design phases. The individual must have a technical software / application development background with specalist experinece in secure architecture design. (Frameworks, processes, best practice etc) Practical experience translating and ensuring that the OWASP top 10, ISO27001, HMG frameworks requirements are reviewed and embedded into project designs which are implemented is essential. Experience working projects through a full development lifecycle is key. You will work along side the design and project teams to idenitfy and mitigate risks throughout the design phases. This is a permanent role. SC clearance is essential as is the ability to get to the London office. (When appropiate #covid) Security DevSecOps consultant. To arrange a discreet call book via https://calendly.com/chris-holt/devsecopp--security-design-review-consultant
-
- CONTRACTOR Cyber Vulnerability Analyst, NESSUS, Rapid 7, SC clearance required.
- London
- N/A
-
Cyber Vulnerability analyst NESSUS, Rapid 7, needed for IMMEDIATE 3 month contract MUST have / be able to achieve UK SC clearance role to work within a live environment within a public sector department. The individual must have experience in using various security methods and tools such as Rapid7 and NESSUS scan for / identify vulnerabilities, prioritise them according to risk and raise appropriate tickets for remediation / follow up. In depth experience utilising Nessus highly beneficial. Current cyber public sector experience highly desirable.