Purple Team Exercises as a Training Mechanism for SOC Analyst Development
APA Citation
Carter, W. & Johansson, E. (2024). Purple Team Exercises as a Training Mechanism for SOC Analyst Development. *Journal of Information Security and Applications*. https://doi.org/10.1016/j.jisa.2024.103712
View original paper →What Did This Cybersecurity Research Find?
This cybersecurity training study evaluated purple team exercises as a SOC analyst development tool across 6 organizations. Cybersecurity analysts who participated in monthly purple team sessions improved threat detection accuracy by 32% and developed a significantly better understanding of attacker methodologies.
Key Findings
- 1Analysts in monthly purple team exercises improved detection accuracy by 32%
- 2Understanding of MITRE ATT&CK techniques improved by 44% after 6 months of purple team participation
- 3Analysts reported that seeing attacks from the adversary perspective was the most valuable learning element
- 4Purple team trained analysts wrote 28% more effective detection rules
- 5The cost per analyst for purple team training was comparable to sending analysts to external conferences
How Does This Apply to Cybersecurity Careers?
SOC analysts can advocate for purple team participation as professional development. Managers can use purple teaming as both an operational improvement and training investment.
Who Should Read This?
Frequently Asked Questions
What did this cybersecurity research find?
This cybersecurity training study evaluated purple team exercises as a SOC analyst development tool across 6 organizations. Cybersecurity analysts who participated in monthly purple team sessions improved threat detection accuracy by 32% and developed a significantly better understanding of attacker methodologies.
How is this research relevant to cybersecurity careers?
SOC analysts can advocate for purple team participation as professional development. Managers can use purple teaming as both an operational improvement and training investment.
Where was this cybersecurity research published?
This study was published in Journal of Information Security and Applications in 2024. The DOI is 10.1016/j.jisa.2024.103712. Access the original paper through the publisher link above.
Explore Related Cybersecurity Resources
Get cybersecurity career insights delivered weekly
Join cybersecurity professionals receiving weekly intelligence on threats, job market trends, salary data, and career growth strategies.
Get Cybersecurity Career Intelligence
Weekly insights on threats, job trends, and career growth.
Unsubscribe anytime. More options