Intelligent CIO Europe Issue 26 | Page 22

LATEST INTELLIGENCE THE RISE OF CLOUD-BASED SECURITY ANALYTICS AND OPERATIONS TECHNOLOGIES JON OLTSIK, SENIOR PRINCIPAL ANALYST AND ESG FELLOW PRESENTED BY Download whitepaper here 22 INTELLIGENTCIO R Research Objectives This study sought to: Security analytics and operations can be complex, requiring highly skilled professionals and detailed processes. To overcome these issues, security teams tend to deploy an array of security analytics tools and technologies to collect, process, analyze, and act upon growing volumes of security telemetry. Despite this investment, however, many organizations continue to find it difficult to manage cyber risk or detect and respond to cyber incidents. • Determine current strategies used for security analytics and operations. • Identify how security analytics and operations challenges are affecting organizations’ ability to monitor cyber risks and detect/respond to cyber-attacks. • Understand the impact of using public cloud resources for processing and storing data on security analytics and operations technology decisions. • Uncover future enterprise security analytics and operations strategies and plans. How can CISOs address these issues and develop effective security analytics and operations processes? In order to get more insight into these trends, ESG surveyed 406 IT and cybersecurity professionals at organizations in North America (U.S. and Canada) involved with the planning, implementation, and/ or operations of their organization’s information security policies, processes (including purchase decisions), or technical safeguards and familiar with their organization’s collection and/or analysis of security data in support of information security management strategy. Executive Summary External changes and internal inefficiencies make security analytics and operations difficult. Security professionals find it challenging to keep up with the cyber-threat landscape and the growing IT attack surface driven by initiatives like cloud computing, digital transformation, and IoT. At the same time, security operations centers (SOCs) www.intelligentcio.com