{"id":11050,"date":"2025-07-16T10:18:34","date_gmt":"2025-07-16T15:18:34","guid":{"rendered":"https:\/\/www.carahsoft.com\/wordpress\/?p=11050"},"modified":"2025-07-30T08:17:23","modified_gmt":"2025-07-30T13:17:23","slug":"torq-how-public-sector-agencies-can-operationalize-cisa-blog-2025","status":"publish","type":"post","link":"https:\/\/www.carahsoft.com\/wordpress\/torq-how-public-sector-agencies-can-operationalize-cisa-blog-2025\/","title":{"rendered":"How Public Sector Agencies Can Operationalize CISA\u2019s SIEM and SOAR Guidance"},"content":{"rendered":"\n<p>In May 2025, the Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with the Australian Cyber Security Centre (ACSC), released new executive guidance to help Public Sector leaders effectively leverage Security Information and Event Management (SIEM) and Security Orchestration, Automation and Response (SOAR) platforms. This guidance aims to strengthen agencies\u2019 cybersecurity by enhancing threat detection, response times and operational efficiencies.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Key Challenges in SIEM and SOAR Implementation<\/h2>\n\n\n\n<p>SIEM platforms aggregate and analyze telemetry data from multiple sources, including: endpoints, applications, network devices and cloud environments.<\/p>\n\n\n\n<p>SOAR platforms complement SIEM by automating security workflows, significantly speeding up incident response and reducing alert fatigue. When effectively integrated, these tools enable agencies to centralize security monitoring, automate routine response tasks and improve compliance with cybersecurity mandates.<\/p>\n\n\n\n<p>For all organizations, especially Public Sector organizations, SIEM and SOAR are not just technical tools; they are foundational to building a proactive and time-sensitive cybersecurity posture. These platforms can help agencies increase operational efficiency, reduce alert fatigue and drive compliance with Federal and State cybersecurity mandates.<\/p>\n\n\n\n<p>CISA guidance highlights several common challenges that agencies often encounter when implementing SIEM and SOAR platforms. These include the difficulty of normalizing diverse log data across multiple systems, minimizing false positives that overwhelm analysts and managing the high costs associated with implementation. Agencies also struggle to ensure effective executive oversight of security operations and face ongoing challenges in attracting and retaining qualified cybersecurity talent.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Addressing Challenges with Torq Hyperautomation<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/07\/Torq-Blog-Graphic-1.jpg\" alt=\"\" class=\"wp-image-11116\" style=\"object-fit:cover;width:300px;height:300px\" srcset=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/07\/Torq-Blog-Graphic-1.jpg 300w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/07\/Torq-Blog-Graphic-1-150x150.jpg 150w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/figure><\/div>\n\n\n<p><a href=\"https:\/\/torq.io\/hyperautomation\/\" target=\"_blank\" data-track=\"Carahsoft - Torq CISA 2025 - Hyperautomation\" rel=\"noopener\">Torq Hyperautomation\u2122<\/a> directly addresses the implementation challenges faced by Public Sector cybersecurity teams by delivering strategic advantages that legacy SOAR platforms cannot. Unlike traditional solutions, Torq integrates seamlessly with existing SIEM tools to normalize and enrich log data, reduce alert noise and improve the clarity of actionable insights. It leverages AI-driven decision-making to automate dynamic incident response workflows, allowing security teams to respond faster and more precisely.<\/p>\n\n\n\n<p>By combining AI-powered decision logic with adaptive response runbooks, Torq enables organizations to overcome the limitations of legacy SOAR, dramatically improving Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR). This empowers analysts to focus on critical, high-impact threats rather than getting bogged down by repetitive, routine tasks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Cost-Effective Automation for Resource-Constrained Agencies<\/h2>\n\n\n\n<p>Public Sector agencies struggle with resource constraints, and Torq also delivers cost-effective automation. Instead of requiring deep engineering expertise or lengthy integration cycles, Torq offers:<\/p>\n\n\n\n<ul>\n<li>Intuitive, no-code and low-code automation capabilities<\/li>\n\n\n\n<li>Seamless integrations with existing Federal, State and Local cybersecurity toolsets (endpoint, identity, cloud, firewall)<\/li>\n\n\n\n<li>Rapid implementation timelines, ensuring immediate value and reduced costs<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Enhanced Executive Visibility and Compliance<\/h2>\n\n\n\n<p>From an executive perspective, Torq addresses a crucial component of the CISA guidance: visibility and oversight. Executive dashboards within the platform provide real-time insights into SOC effectiveness, incident trends and automation impact. This visibility enables better budgeting decisions, more effective KPIs and compliance reporting aligned with key security and compliance frameworks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Real-World Impact<\/h2>\n\n\n\n<p>Torq is already delivering substantial results within Public Sector environments.&nbsp; Torq has enabled SOC teams to automate ransomware response, consolidate multi-environment telemetry and auto-generate compliance artifacts. Whether an agency is modernizing its cybersecurity stack, preparing for audits or trying to do more with fewer analysts, Torq is built to support their journey.<\/p>\n\n\n\n<p>Agencies leveraging Torq have achieved the following:<\/p>\n\n\n\n<ul>\n<li>Up to 90% reduction in investigation time<\/li>\n\n\n\n<li>3-5x increase in alert handling capacity with no added headcount<\/li>\n\n\n\n<li>95% of Tier-1 security cases auto-remediated<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a>Taking the Next Step<\/h2>\n\n\n\n<p>CISA\u2019s SIEM and SOAR guidance represents a critical shift from reactive cybersecurity practices toward proactive, integrated and automated security operations. As a trusted partner of Carahsoft, Torq is uniquely positioned to help Public Sector agencies rapidly operationalize this guidance. Torq\u2019s scalable, secure and measurable automation platform ensures agencies not only comply with evolving standards but also stay ahead of modern threats.<\/p>\n\n\n\n<p><strong><em>To learn how Torq can empower your agency\u2019s cybersecurity strategy, <a data-track=\"Carahsoft - Torq CISA 2025 - Bottom CTA\" href=\"https:\/\/torq.io\/demo\/\" target=\"_blank\" rel=\"noopener\">request a demo<\/a> or explore a tailored pilot use case today.<\/em><\/strong><\/p>\n\n\n\n<p><em>Carahsoft Technology Corp. is The Trusted Government IT Solutions Provider, supporting Public Sector organizations across Federal, State and Local Government agencies and Education and Healthcare markets. As the Master Government Aggregator\u202ffor our vendor partners, including Torq we deliver\u202f<a data-track=\"Carahsoft - Torq CISA 2025 - Carahsoft Solve\" href=\"https:\/\/www.carahsoft.com\/solve\" target=\"_blank\" rel=\"noreferrer noopener\">solutions<\/a>\u202ffor Geospatial, Cybersecurity,&nbsp;MultiCloud,&nbsp;DevSecOps, Artificial Intelligence, Customer Experience and Engagement, Open Source and more. Working with resellers, systems integrators and consultants, our sales and marketing teams provide industry leading IT products, services and training through hundreds of contract vehicles. Explore the&nbsp;<a data-track=\"Carahsoft - Torq CISA 2025 - Carahsoft Blog\" href=\"https:\/\/www.carahsoft.com\/blog\" target=\"_blank\" rel=\"noreferrer noopener\">Carahsoft Blog<\/a>&nbsp;to learn more about the latest trends in Government technology markets and solutions, as well as Carahsoft\u2019s ecosystem of partner thought-leaders.<\/em><\/p>\n\n\n<p><head><meta name=\"url\" property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/blog\/torq-how-public-sector-agencies-can-operationalize-cisa-blog-2025\"><\/head><\/p>","protected":false},"excerpt":{"rendered":"<p>In May 2025, the Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with the Australian Cyber Security Centre (ACSC), released new executive guidance to help Public Sector leaders effectively leverage Security Information and Event Management (SIEM) and Security Orchestration, Automation &hellip; <a href=\"https:\/\/www.carahsoft.com\/wordpress\/torq-how-public-sector-agencies-can-operationalize-cisa-blog-2025\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":11118,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2,157,1493],"tags":[1172,545,611,1632],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Agencies Can Operationalize CISA&#039;s Guidance | Carahsoft<\/title>\n<meta name=\"description\" content=\"CISA new 2025 guidance helps Public Sector leaders optimize SIEM and SOAR tools for improved threat detection and faster response.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.carahsoft.com\/wordpress\/torq-how-public-sector-agencies-can-operationalize-cisa-blog-2025\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Agencies Can Operationalize CISA&#039;s Guidance | Carahsoft\" \/>\n<meta property=\"og:description\" content=\"CISA new 2025 guidance helps Public Sector leaders optimize SIEM and SOAR tools for improved threat detection and faster response.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/wordpress\/torq-how-public-sector-agencies-can-operationalize-cisa-blog-2025\/\" \/>\n<meta property=\"og:site_name\" content=\"| Carahsoft\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-16T15:18:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-30T13:17:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/07\/Torq-Blog-Graphic-2-875x635-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"875\" \/>\n\t<meta property=\"og:image:height\" content=\"635\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"caduncan@carahsoft.com\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"caduncan@carahsoft.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/torq-how-public-sector-agencies-can-operationalize-cisa-blog-2025\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/torq-how-public-sector-agencies-can-operationalize-cisa-blog-2025\/\"},\"author\":{\"name\":\"caduncan@carahsoft.com\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/7ef36b93fd236bf4ee76ab49a9105ef5\"},\"headline\":\"How Public Sector Agencies Can Operationalize CISA\u2019s SIEM and SOAR Guidance\",\"datePublished\":\"2025-07-16T15:18:34+00:00\",\"dateModified\":\"2025-07-30T13:17:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/torq-how-public-sector-agencies-can-operationalize-cisa-blog-2025\/\"},\"wordCount\":764,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/torq-how-public-sector-agencies-can-operationalize-cisa-blog-2025\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/07\/Torq-Blog-Graphic-2-875x635-1.jpg\",\"keywords\":[\"CISA\",\"Cybersecurity\",\"Federal Government\",\"Torq\"],\"articleSection\":[\"Cybersecurity\",\"Federal Government\",\"Partners\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/torq-how-public-sector-agencies-can-operationalize-cisa-blog-2025\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/torq-how-public-sector-agencies-can-operationalize-cisa-blog-2025\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/torq-how-public-sector-agencies-can-operationalize-cisa-blog-2025\/\",\"name\":\"How Agencies Can Operationalize CISA's Guidance | Carahsoft\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/torq-how-public-sector-agencies-can-operationalize-cisa-blog-2025\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/torq-how-public-sector-agencies-can-operationalize-cisa-blog-2025\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/07\/Torq-Blog-Graphic-2-875x635-1.jpg\",\"datePublished\":\"2025-07-16T15:18:34+00:00\",\"dateModified\":\"2025-07-30T13:17:23+00:00\",\"description\":\"CISA new 2025 guidance helps Public Sector leaders optimize SIEM and SOAR tools for improved threat detection and faster response.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/torq-how-public-sector-agencies-can-operationalize-cisa-blog-2025\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/torq-how-public-sector-agencies-can-operationalize-cisa-blog-2025\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/torq-how-public-sector-agencies-can-operationalize-cisa-blog-2025\/#primaryimage\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/07\/Torq-Blog-Graphic-2-875x635-1.jpg\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/07\/Torq-Blog-Graphic-2-875x635-1.jpg\",\"width\":875,\"height\":635},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/torq-how-public-sector-agencies-can-operationalize-cisa-blog-2025\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.carahsoft.com\/wordpress\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Public Sector Agencies Can Operationalize CISA\u2019s SIEM and SOAR Guidance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"name\":\"| Carahsoft\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\",\"name\":\"Carahsoft\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png\",\"width\":3184,\"height\":846,\"caption\":\"Carahsoft\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/7ef36b93fd236bf4ee76ab49a9105ef5\",\"name\":\"caduncan@carahsoft.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/170e441354efb33164baf70f4f675d15?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/170e441354efb33164baf70f4f675d15?s=96&d=mm&r=g\",\"caption\":\"caduncan@carahsoft.com\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Agencies Can Operationalize CISA's Guidance | Carahsoft","description":"CISA new 2025 guidance helps Public Sector leaders optimize SIEM and SOAR tools for improved threat detection and faster response.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.carahsoft.com\/wordpress\/torq-how-public-sector-agencies-can-operationalize-cisa-blog-2025\/","og_locale":"en_US","og_type":"article","og_title":"How Agencies Can Operationalize CISA's Guidance | Carahsoft","og_description":"CISA new 2025 guidance helps Public Sector leaders optimize SIEM and SOAR tools for improved threat detection and faster response.","og_url":"https:\/\/www.carahsoft.com\/wordpress\/torq-how-public-sector-agencies-can-operationalize-cisa-blog-2025\/","og_site_name":"| Carahsoft","article_published_time":"2025-07-16T15:18:34+00:00","article_modified_time":"2025-07-30T13:17:23+00:00","og_image":[{"width":875,"height":635,"url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/07\/Torq-Blog-Graphic-2-875x635-1.jpg","type":"image\/jpeg"}],"author":"caduncan@carahsoft.com","twitter_misc":{"Written by":"caduncan@carahsoft.com","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.carahsoft.com\/wordpress\/torq-how-public-sector-agencies-can-operationalize-cisa-blog-2025\/#article","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/torq-how-public-sector-agencies-can-operationalize-cisa-blog-2025\/"},"author":{"name":"caduncan@carahsoft.com","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/7ef36b93fd236bf4ee76ab49a9105ef5"},"headline":"How Public Sector Agencies Can Operationalize CISA\u2019s SIEM and SOAR Guidance","datePublished":"2025-07-16T15:18:34+00:00","dateModified":"2025-07-30T13:17:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/torq-how-public-sector-agencies-can-operationalize-cisa-blog-2025\/"},"wordCount":764,"commentCount":0,"publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/torq-how-public-sector-agencies-can-operationalize-cisa-blog-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/07\/Torq-Blog-Graphic-2-875x635-1.jpg","keywords":["CISA","Cybersecurity","Federal Government","Torq"],"articleSection":["Cybersecurity","Federal Government","Partners"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.carahsoft.com\/wordpress\/torq-how-public-sector-agencies-can-operationalize-cisa-blog-2025\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.carahsoft.com\/wordpress\/torq-how-public-sector-agencies-can-operationalize-cisa-blog-2025\/","url":"https:\/\/www.carahsoft.com\/wordpress\/torq-how-public-sector-agencies-can-operationalize-cisa-blog-2025\/","name":"How Agencies Can Operationalize CISA's Guidance | Carahsoft","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/torq-how-public-sector-agencies-can-operationalize-cisa-blog-2025\/#primaryimage"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/torq-how-public-sector-agencies-can-operationalize-cisa-blog-2025\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/07\/Torq-Blog-Graphic-2-875x635-1.jpg","datePublished":"2025-07-16T15:18:34+00:00","dateModified":"2025-07-30T13:17:23+00:00","description":"CISA new 2025 guidance helps Public Sector leaders optimize SIEM and SOAR tools for improved threat detection and faster response.","breadcrumb":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/torq-how-public-sector-agencies-can-operationalize-cisa-blog-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.carahsoft.com\/wordpress\/torq-how-public-sector-agencies-can-operationalize-cisa-blog-2025\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/torq-how-public-sector-agencies-can-operationalize-cisa-blog-2025\/#primaryimage","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/07\/Torq-Blog-Graphic-2-875x635-1.jpg","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2025\/07\/Torq-Blog-Graphic-2-875x635-1.jpg","width":875,"height":635},{"@type":"BreadcrumbList","@id":"https:\/\/www.carahsoft.com\/wordpress\/torq-how-public-sector-agencies-can-operationalize-cisa-blog-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.carahsoft.com\/wordpress\/"},{"@type":"ListItem","position":2,"name":"How Public Sector Agencies Can Operationalize CISA\u2019s SIEM and SOAR Guidance"}]},{"@type":"WebSite","@id":"https:\/\/www.carahsoft.com\/wordpress\/#website","url":"https:\/\/www.carahsoft.com\/wordpress\/","name":"| Carahsoft","description":"","publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization","name":"Carahsoft","url":"https:\/\/www.carahsoft.com\/wordpress\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png","width":3184,"height":846,"caption":"Carahsoft"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/7ef36b93fd236bf4ee76ab49a9105ef5","name":"caduncan@carahsoft.com","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/170e441354efb33164baf70f4f675d15?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/170e441354efb33164baf70f4f675d15?s=96&d=mm&r=g","caption":"caduncan@carahsoft.com"}}]}},"_links":{"self":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/11050"}],"collection":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/comments?post=11050"}],"version-history":[{"count":3,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/11050\/revisions"}],"predecessor-version":[{"id":11117,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/11050\/revisions\/11117"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media\/11118"}],"wp:attachment":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media?parent=11050"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/categories?post=11050"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/tags?post=11050"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}