Emphasize automa on - At every turn, automa ng security
workloads in the cloud takes the guesswork and human error
out of execu ng a security strategy. Automa ng rou ne, day-
to-day tasks — intrusion detec on and preven on, endpoint
monitoring, alerts to data breaches, log management and
aggrega on, and management of an -virus and malware
protec on for hardware — allows companies to refocus
valuable security exper se on higher-value ac vi es and
proac vely thwar ng cyber a acks.
Seek outside support and exper se - Even with a
competent CISO at the helm, it's exceedingly difficult for
any company to internally iden fy and manage every single
aspect of cybersecurity. Instead, thirdparty cloud-managed
security (CMS) services provide organiza ons with a
comprehensive gameplan and staff to protect all systems,
storage, data and devices from threats by tying together the
best technologies, services, and exper se when internal IT
teams may not be robust enough.
Less than one-quarter
of the respondents in the Ponemon
Ins tute study said their organiza on
significantly uses automa on technologies in
their response process.
Source: Ponemon Ins tute The 2019 Study on the Cyber
Resilient Organiza on."
10
oneneck.com
04