Seven Security Activities You Should Automate — SecurityWeek

By Walker Banerd October 17, 2018 incident-response, security-orchestration-automation-response

A new article by Stan Engelbrecht, Director of D3’s Cyber Security Practice, is currently featured on SecurityWeek. Security automation is often sold based on the promise of helping security teams save time and act faster. While these benefits are real, there are also many other use cases for automation that get less attention. In his new article, Stan covers seven aspects of security operations that organizations should consider automating, including some you probably haven’t considered.

In this excerpt, Stan covers two opportunities to use automation to enhance communication across the security team and beyond.

Reporting Thresholds

It’s important for managers, executives, and other stakeholders to have visibility into security processes, but you don’t want to waste your security team’s time with filling out and sending regular reports. With automation, you can set thresholds that trigger reports, such as when there are too many open incidents, or when someone has missed an important deadline.

Notifications and Task Assignments

Automation isn’t just about making actions faster, it can also be used to help coordinate the people and processes that make up your security team. Similar to setting thresholds for automated reporting, automated tools can be used to set criteria for automated notifications and assignments. For example, automated notifications might remind analysts of open tasks or approaching deadlines, or a task might be assigned to the legal team when an approval is needed.

This article can be found in its entirety on SecurityWeek. To continue reading, please click here

Walker Banerd

Walker Banerd

Walker is the Communications Manager at D3. He leads the writing of D3's blog, as well as white papers, industry briefings, and other thought leadership. Walker's expertise is translating technical concepts into easily understandable content, with a focus on software, cybersecurity, and compliance solutions.


Comments

comments for this post are closed