Back
#263
February 16, 2026

EP263 SOC Refurbishing: Why New Tools Won’t Fix Broken Processes (Even With AI)

Guest:

Topics:

Artificial Intelligence SIEM and SOC
29:29

Subscribe at YouTube

Subscribe at Spotify

Subscribe at Apple Podcasts

Topics covered:

  • What is the right way for people to bridge the gap and translate executive dreams and board goals into the reality of life on the ground?
  • How do we talk to people who think they have "transformed" their SOC simply by buying a better, shinier product (like a modern SIEM) while leaving their old processes intact?
  • What are the specific challenges and advantages you’ve seen with a federated SOC versus a centralized one? What does a "federated" or "sub-SOC" model actually mean in practice?
  • Why is the message that "EDR doesn't cover everything" so hard for some people to hear? Is this obsession with EDR a business decision or technology debt?
  • How do you expect AI to change the calculus around data centralization versus data federation?
  • What is your favorite example of telemetry that is useful, but usually excluded from a SIEM?
  • What are the Detection and Response organizational metrics that you think are most valuable?
  • Is the continued use of Excel an issue of tooling, laziness, or just because it is a fundamentally good way to interact with a small database?

Do you have something cool to share? Some questions? Let us know:

Transcript

The conversation centered on the critical necessity of balancing people, process, and technology within modern Security Operations Centers (SOC). Danny Lyman emphasized that while high-level board objectives and cutting-edge technology are frequently prioritized, the underlying operational processes are often neglected. This neglect leads to a "modernization trap" where organizations upgrade tools (e.g., moving from legacy SIEM to cloud-native platforms) without evolving their investigative workflows. The discussion further explored the limitations of EDR-centric strategies, the potential role of AI in synthesizing multi-stack telemetry, and the enduring relevance of foundational metrics like Mean Time to Contain (MTTC).

Detailed Discussion and Strategic Insights

Bridging the Executive-Operational Gap

A recurring challenge in cybersecurity is the disconnect between board-level aspirations and the daily realities of security analysts. Lyman argued that achieving organizational objectives requires a synchronized "trifecta": people, process, and technology. He observed a tendency for teams to gravitate toward technology-only solutions, assuming that a "shiny new tool" equates to advanced capability. However, without rigorous process coordination—particularly in federated models—scaling remains impossible. Process provides the guardrails that transform novice analysts into experts by establishing "muscle memory" for correct execution.

The Fallacy of Tool-Only Transformation

The group addressed the misconception that replacing a legacy appliance with a modern SaaS solution constitutes "SOC transformation." Anton Chuvakin noted that many organizations simply perform the same outdated tasks faster rather than leveraging the unique capabilities of new technology (e.g., sub-second searches). Lyman compared this to driving an electric vehicle with the mindset of a horse-and-buggy driver. If the investigative process does not change to accommodate higher speeds and better data visibility, the transformation is merely superficial.

Federated vs. Centralized SOC Models

The discussion defined "federated SOC" through two lenses:

Geographic/Locality Driven: Specialized teams in different regions (e.g., Hong Kong, Brussels) following unified procedures.

Technological/Expertise Driven: Specialization by domain, such as "network ninjas" focusing on NDR or identity experts focusing on IAM. The primary risk of federation is the loss of correlation. If identity, network, and endpoint teams operate in silos, the organization may miss the broader context of a multi-stage attack.

The EDR Obsession and Attack Surface Realities

Lyman and the hosts critiqued the industry's over-reliance on Endpoint Detection and Response (EDR). While EDR is a vital control, it is not a "silver bullet." It fails to cover significant portions of the attack surface, such as compromised routers, legacy security appliances, and cloud-native application layers. The consensus was that security leaders often fall into a "too big to fail" mindset regarding EDR investments, ignoring the fact that no single control can be fully trusted.

The Role of AI and Data Centralization

AI's true potential in the SOC lies in its ability to link signals across the entire OSI stack (Layers 1 through 7). Lyman suggested that AI could eventually create "super rules" by synthesizing telemetry that is currently too voluminous for human analysts to manage. However, this is contingent on data accessibility. "Data puddles"—isolated, shallow data stores—and the difficulty of normalizing complex logs (like JBoss or application logs) remain significant barriers.

Operational Metrics: Prioritizing Containment

When evaluating SOC performance, Lyman prioritized Mean Time to Contain (MTTC) over Mean Time to Detect (MTTD). While detection is necessary, the value of an incident response team is ultimately measured by how quickly they can stop the bleeding once an incident is confirmed. Focusing on containment forces a mindset shift toward active mitigation rather than just passive observation.

The "Excel in the Nineties" Phenomenon

Despite the push for "Detection as Code" and AI-driven automation, Microsoft Excel remains a staple in incident response. The group debated whether this is due to analyst laziness or a genuine lack of better UI/UX for managing small, ad-hoc databases. Lyman challenged the industry to build better interfaces that provide the flexibility of Excel without the risks of decentralized data management.

Timeline of Key Topics

Introduction and the "Tangent" Disclaimer

The hosts set the stage for a discussion blending "magic and utility" with insights into detection and response.

The Disconnect Between Board Objectives and Ground Reality

Analysis of the People-Process-Technology triad and why process is the most frequently ignored component.

Defining the Modern SOC Transformation

A critique of tool-swapping vs. actual procedural evolution.

Exploration of the Federated SOC Model

The benefits of specialization versus the challenges of cross-team correlation and geographic locality.

The Limitations of EDR and the "Single Control" Fallacy

A deep dive into why EDR obsession is dangerous and the need for multi-control visibility.

The Impact of AI on Telemetry Management

How AI might bridge signals across the OSI stack and the "crippling" scale of modern data consumption.

The "Nuggets of Gold" in Application Logs

Discussing the difficulty of normalizing app-layer telemetry and its value in investigations.

Defining Critical DNR Metrics

A shift in focus from detection times to the strategic importance of Mean Time to Contain (MTTC).

The Persistent Role of Excel in IR

Debating why 1990s tools still dominate 2020s security operations.

Closing Advice and Philosophical Book Recommendations

Lyman’s final thoughts on mission focus and a unique look at Sebastian Junger’s In My Time of Dying as a metaphor for incident triage.

View more episodes