4 Hurdles That Trip Security Analytics Efforts

  /     /     /  
Publicated : 22/11/2024   Category : security


4 Hurdles That Trip Security Analytics Efforts


Dont let these people and process problems get in the way of security analytics effectiveness.



While much of the focus on emerging security analytics programs tends to fixate on the data science, algorithms, and technology that makes it all possible, people and process plays as much of a role in analytics as it does in any other facet of security. Many organizations today are learning that lesson the hard way as they find process-oriented impediments standing in the way of security analytics success.
Following are some of the common organizational mistakes that trip up enterprises.
Organizational silos block data flows
To get the full benefit out of a mature security analytics program, data scientists need to get their hands on a lot of contextual business data and IT operational data that doesnt come from security devices.
Dont underestimate the importance of functional collaboration, says Jessica Gulick, chief strategist for Global Cyber solutions at CSG International. Accurately correlating security data with business and IT analytics will promote a well-rounded approach.
Unfortunately, organizational structure can greatly impede the free flow of data.
There [are] often these silos in larger organizations where the people who run the firewall or run the vulnerability scan might not even be in the security group; theyre operations, says John Pescatore, director of emerging trends at SANS Institute. Then the threat analytics guys are in the security group and theyre using totally different tools, and the data found in the other silos never get banged into each other.
Read the rest of this article on
Dark Reading
.

Last News

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security

▸ Hack Your Hotel Room ◂
Discovered: 23/12/2024
Category: security

▸ Website hacks happened during World Cup final. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
4 Hurdles That Trip Security Analytics Efforts