University of Maryland Baltimore County Practices in Establishing SOCC Paper Prepare a short “talking points” paper in which you answer the question: What best practices should Sifers-Grayson follow when establishing a SOCC?Nofsinger Consulting has recommended that Sifers-Grayson invest in an EnterpriseYou are approaching the end of your time supporting Sifers-Grayson. Your team leader has asked you to prepare a 2-page research and analysis brief (“briefing paper”) for the company’s executives in which you identify the five most important technologies which the company should adopt in order to improve its security posture. In your talking points, you should address how your selected best practices support the phases of the incident response process (i.e. Incident Detection, Containment, Eradication, & Recovery) and discuss the role of that a Security Operations Center will play in making sure that incidents are handled and reported in an effective and efficient manner. Your “talking points” should be 3 to 5 paragraphs long (15 – 25 specific bullet points). Your audience is a group of Sifers-Grayson executives who are reviewing the plans for establishing an internal SOCC. (Outsourcing the SOCC was considered and that option was rejected.) Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your article. Architecture tool to help it document the assets, processes, and network infrastructure that comprise its information enterprise. Based upon past experience with such recommendations, the Nofsinger team knows that it must be prepared for debate amongst the client’s managers and executives as to the relative merits of such tools. To help your team prepare for the expected debate, you have been asked to write a 3 to 5 paragraph response to the question “Why does Sifers-Grayson need an Enterprise Architecture tool?” You should focus on the benefits of having a tool that can help guide the creation of an enterprise architecture. Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting. Provide specific details as to why each technology is required (what is the vulnerability or weakness that the technology will address). Then, make a recommendation for how the company should implement that technology. You must provide specific, actionable information. Your recommendations must also be based upon recognized best practices. Include the following steps in your research and analysis as you select and evaluate technologies, products, and services that will help improve the company’s security posture: Identify Candidate TechnologiesResearch Products and Services which implement the technologiesIdentify VendorsEvaluate Products & Services (use existing market research) Cite the sources of information used in your research and analysis (document where you obtained your information from). Use a professional citation format and provide a reference list at the end of your briefing paper.