Automation isn’t automatic: it takes diligent steps to improve your security environment. Credit: Thinkstock There is data in every business process, behind every human action and in each machine-to-machine interaction. The large-scale digitization taking place across the enterprise is constantly transforming the way businesses are run. This digital transformation amplifies the inherent risks and potential vulnerabilities across the technological footprint. This means the very nature of security operations is changing.For many CISOs and CIOs the new objective is to shift from perimeter-based defenses to an analytics-driven approach. This approach leverages data from traditional IT systems, internet connected devices and the cloud – providing visibility across the entire ecosystem. And, it means complete end-to-end knowledge of who, what, when, where and how incidents are happening is required.A security operations team can only manage and respond to what it can see. Even mature enterprises and seasoned security professionals end up short on visibility. This causes a reactive operational posture, always rushed, hurried, uncertain of their level completeness. Most teams that I speak to are drowning in alerts. And investigations take too long. There is an asymmetry between the amount of data to be analyzed and the security and IT staff in place to monitor, detect and respond.Consider this, a ransomware attack is projected to attack a business every 14 seconds by the end of 2019. Ask yourself, how many people does it take to deal with this volume? Too many! Here are three things every security leader should be focused on today to make automation a reality within their SOC. 1. Rationalize the need for automationA recent survey by analyst firm Quocirca found that organizations face an average of 1,200 IT incidents per month, of which 5 will be critical. The challenge in adopting automation isn’t the need. So, what is it? CISOs and analysts alike have shared with me that they struggle to rationalize their automation requirements in terms of business or mission priorities.The ones that are successful start small. Predictable tasks, especially the ones accompanied by a check list, are prime candidates to be automated: activities relating to compliance, internal policy, reporting, or preserving evidence can be automated without the usual concerns of causing harm or business disruptions. It’s important to communicate to the leadership that the goal for automation is to enable the analyst to make faster decisions – it is NOT to replace the analyst. Automation can free security analysts from rote tasks to bridge unintegrated, ill-configured technologies. It can liberate analysts from being data gophers, busy with copy/pasting spreadsheets. And it allows them to focus on higher value decision making, enabling faster investigation and response.2. Evaluate your readiness to automateWhile adopting automation is expected to help alleviate some of the skills shortage and combat the challenge of retaining qualified talent, its contribution to the overall performance and health of the business can be much greater. Automation can help transform the security organization into a center of innovation, positively impacting the business by being anticipatory, providing greater integration within IT and creating insight into risk.To evaluate where you are in the automation journey, CISOs should get process agreements in place before taking steps to introduce automation technologies. As automation of security processes is evaluated, the organization must consider:Clearly articulate the business value BEFORE negotiating with other parts of the organizationData access and data preparationHow to include and inform other areas of the organization, such as IT or operations teamsWhich existing processes and activities need to be modifiedHow existing software and tools (especially those that are underutilized) can be integrated to enhance the overall security investmentHow automation aligns with objectives of both the business and the Security Operations Center (SOC)3. Evangelize the business impactOrganizations will continue to face a prolonged, asymmetric engagement against threat actors and adversaries that are intent on compromising the business or mission. A clear need exists. CISOs can quantify this value to the executive leadership or boards by starting small. Start by automating a set of processes or a particular need; track effectiveness over a short period of time; and report on how automation improved incident detection or reduced mean time to resolution. You can measure in terms of threats detected to threat-investigated ratio, or time spent from identification to incident closure or dollars saved.Automation isn’t magic, nor will it solve all your problems. It takes a dedicated, organizational effort to establish and maintain. As organizations grow and expand their digital footprints, automation will be a key for security teams to serve the business and the mission. Related content opinion User behavior analytics is not a silver bullet The security industry has a knack for spinning up new solutions and repurposing old tools to solve new use cases. While the race to commoditize new solutions helps drive the industry forward, misconceptions about user behavior analytics show why team By Monzy Merza Sep 10, 2018 4 mins Analytics Security opinion The new definition for threat prediction Security is hard enough without inaccurate understandings of your team setting unrealistic expectations for success. Security teams need to demystify the concept of “threat prediction” by addressing three common misunderstandings and move By Monzy Merza Aug 01, 2018 5 mins Data Breach Technology Industry Hacking opinion Redefining threat prediction Security is hard. Some say once we can predict threats all will be better. Should we believe? Maybe. But security teams need to demystify the concept of “threat prediction” by addressing three common misunderstandings, and move their comp By Monzy Merza Jul 16, 2018 5 mins Risk Management Analytics Security opinion The art of machine speed execution Understaffed security teams are struggling to secure their organizations’ expanding technology footprints, and often times the new tools they have been given to manage data bring with them a tidal wave of new data to sift through. In order for By Monzy Merza May 22, 2018 5 mins Machine Learning IT Leadership Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe