Sijmen Ruwhof, Freelance IT Security Consultant / Ethical Hacker, Secundity

Sijmen Ruwhof, Freelance IT Security Consultant / Ethical Hacker, Secundity

Automation Tools Need To Be Tuned To Risk Scenarios

  • Automation plays an essential role when processing data from multiple tools and sources. It enables systems to identify important data while eliminating redundant information much more quickly than humans.
  • To be successful with security-automation tools, you must first investigate risky scenarios specific to the company, and then build detection rules around those scenarios.

“Make a road map of what you want to automate. Then see what security products… reduce time to process
these.”

From Sijmen Ruwhof’s perspective, the complexity of today’s IT environments has made an ethical hacker’s job easier than ever. “I break into systems for my customers, with permission of course,” he says. “I report on all the security vulnerabilities I find and advise customers in how they can protect themselves against hackers.”

This is an excerpt from 7 Experts on Security Automation and Analytics. The eBook was generously sponsored by Juniper Networks.