Tenable: Reducing Cyber Exposure from Cloud to Containers – EMEA Edition
The book includes insights from the following experts: Eric Bedell, MUFG, Chief Information Security Officer, Applying a Data-Centric Strategy in a Vast IT Ecosystem >> Antonio D’Argenio, Tech Data, Worldwide IT Security...
Steve Stonebraker: Security Automation Begins With Visibility
The key point for security is knowing what you have, and being able to monitor and log all activity related to those IT assets. More advanced tools can identify and track unusual activity and provide information about exactly what was happening in the network at the...
Slim Trabelsi: Correlating Security Data From Multiple Sources Requires Deep Learning Tools
The real challenge is how to make sense of huge amounts of threat intelligence data when much of it is redundant. The only way to do this is to apply deep machine learning to that data. Even with many security analysts, it’s impossible to process all the data, yet...
Sijmen Ruwhof: Automation Tools Need To Be Tuned To Risk Scenarios
Automation plays an essential role when processing data from multiple tools and sources. It enables systems to identify important data while eliminating redundant information much more quickly than humans. To be successful with security-automation tools, you...
Dr. Rebecca Wynn: Take The Time To Train Your Tools
Security automation speeds incident detection and response, and it leverages precious security personnel. However, implementing effective security automation is not as easy as simply buying and installing the right tools. Doing the extra work of building your own rule...
Don Welch: Security Automation Requires Different Skills
Analysts who have invested a lot of time in developing their skills sometimes resist tools that can do certain things better and faster. They need to recognize they can use these tools to become even more effective as analysts. Failing to automate security processes...
Bruce Philips: Security Automation Begins With A Process
Begin with a detection and response process, and then adopt the right tool that will help you automate the process. You can determine an appropriate level of security automation, but success comes down to understanding your capabilities, building your playbooks, and...
Brian Bobo: To Minimize Noise, You Need To Select The Right Tools
No matter how good the security is and how great the team is that manages it, they can never react as quickly as technology to malicious activity. One important criterion for any automated solution is whether the security team has the skills and time to tune it. If...
Juniper Networks: 7 Experts on Security Automation and Analytics
The book includes insights from the following experts: Brian Bobo, CISO, Sun Country Airlines, To Minimize Noise, You Need To Select The Right Tools >> Bruce Phillips, SVP & CISO, Williston Financial Group, Security Automation Begins With A Process...
Aaron Weller: The Best Security Metrics Are Actionable
Activity metrics are useful only to prove that you’re doing something, but they don’t show how effective that activity is. Everything that gets presented to the board has to have a clear link back to business value and business strategy. "If a metric changes and you...