How to Build a Government SOC on a Budget

Faced with an endless barrage of threats and vulnerabilities, finding the time to develop a proactive risk mitigation strategy is an uphill struggle for government organizations. With so much energy focused  on protecting the perimeter and preventing network penetration, malicious actors (the enemy with no face) already inside your network often goes unnoticed (case in point, the 2015 OPM breach).