LATEST INTELLIGENCE
THE RISE OF CLOUD-BASED
SECURITY ANALYTICS AND
OPERATIONS TECHNOLOGIES
JON OLTSIK, SENIOR PRINCIPAL ANALYST
AND ESG FELLOW
PRESENTED BY
Download whitepaper here
22
INTELLIGENTCIO
R
Research Objectives This study sought to:
Security analytics and operations can be complex,
requiring highly skilled professionals and detailed
processes. To overcome these issues, security teams
tend to deploy an array of security analytics tools and
technologies to collect, process, analyze, and act upon
growing volumes of security telemetry. Despite this
investment, however, many organizations continue
to find it difficult to manage cyber risk or detect and
respond to cyber incidents. • Determine current strategies used for security
analytics and operations.
• Identify how security analytics and operations
challenges are affecting organizations’ ability
to monitor cyber risks and detect/respond to
cyber-attacks.
• Understand the impact of using public
cloud resources for processing and storing
data on security analytics and operations
technology decisions.
• Uncover future enterprise security analytics and
operations strategies and plans.
How can CISOs address these issues and develop
effective security analytics and operations processes?
In order to get more insight into these trends, ESG
surveyed 406 IT and cybersecurity professionals at
organizations in North America (U.S. and Canada)
involved with the planning, implementation, and/
or operations of their organization’s information
security policies, processes (including purchase
decisions), or technical safeguards and familiar
with their organization’s collection and/or analysis
of security data in support of information security
management strategy.
Executive Summary
External changes and internal inefficiencies
make security analytics and operations difficult.
Security professionals find it challenging to keep up
with the cyber-threat landscape and the growing
IT attack surface driven by initiatives like cloud
computing, digital transformation, and IoT. At
the same time, security operations centers (SOCs)
www.intelligentcio.com