The book includes insights from the following experts:
- Dan Bowden, VP & CISO, Sentara Healthcare, A Strategy Matrix Helps Set Priorities >>
- James Carder, CSO & VP, LogRhythm Labs,
LogRhythm, Automation and Correlation are Key >> - Joseph Weinberg, Strategy & Architectural Leader—Global Cybersecurity, Luxury Hospitality Company, Remove Multiple Dashboards Through Better Integration >>
- Phillip Miller, Head of Infrastructure & CISO,
Brooks Brothers, Open APIs are the Keys to Orchestration and Automation >>
- Rick McElroy, Head of Security Strategy,
Carbon Black, Inc., Focus on Detection and Remediation Outcomes >> - Ted Julian, VP Product Management & Cofounder, IBM Resilient, Define Your Processes Before Trying to Automate Them >>
- Tony Evans, Chief Information Officer, Enloe Medical Center, Optimization of the Security
Stack Is a Balancing Act >> - Tom Kartanowicz, Regional CISO, International Investment Bank, A Security Stack Must Operate In An Extended IT Environment >>
8 Experts on Optimizing Your Security Stack was generously sponsored by Carbon black.
Security teams have a difficult task to perform, and it’s not getting any easier. IT environments are becoming more complex, threats are becoming more sophisticated, and the number of known vulnerabilities is dramatically increasing. In addition, there is a critical shortage of skilled IT security specialists, and the tools used to defend IT environments are rapidly evolving.
Many organizations have reached a critical point where they must optimize their security stack just to keep up with threats and maintain their risk profile. Yet adding new technology requires new skills, and it potentially adds even more complexity. How are organizations addressing these challenges?
With the generous support of Carbon Black, we decided to dig into the problem by asking seven security experts the following question: What suggestions do you have for organizations that want to upgrade and optimize their security stack?
People across industries agree on the importance of being able to correlate data from the network, endpoints, and user behaviors and automating as many detection and response tasks as possible. To avoid adding unnecessary complexity, they recommend starting with a plan that includes the outcomes you expect to achieve.
This eBook explores strategies for getting the most out of your security stack. If you ever lie awake at night worrying about security issues you will face tomorrow, or even if you don’t, there is plenty of good advice in these essays.