Automating the security function

Automating the security function

1000

We鈥檙e seeing a convergence of data in the interest of automating security from identity authentication through threat detection and response. A broad set of know-your-customer (KYC) data is being gathered and analyzed by many sectors, including financial services, eCommerce/retail, technology, media and telecommunications, and automotive, among others. This information typically has been heavily siloed. But companies are beginning to realize they are sitting on a treasure trove of data that鈥攊f better organized and made more efficiently accessible鈥� can be extracted and analyzed for a variety of value-added purposes.

automating the security function

The landscape as we see it

Companies are working hard to automate functions that until very recently have been purely manual, by pulling together historically disparate data sets.

Not only are businesses better able to confirm that digital customers are who they say they are, they are also acquiring deeper information, such as who has a virus on their computer, who recently received a phishing email, and who tried to enter a network to which they don鈥檛 have access.

Security professionals are combining third-party tools and in-house solutions to automate as much of the overall cyber playbook as possible, and align it with the organization鈥檚 business development and customer experience objectives. Companies are looking to automate the first and second lines of defense via the cloud to better respond to threats across the enterprise without a human having to do that work, while simultaneously confirming that the security controls they expect to have in place are indeed operating as expected.

What we believe you should do about it

Always remember: Whoever controls the data has the power. With that firmly in mind, the first step is to transfer your critical enterprise data from the different third-party vendors that so many companies maintain across their systems into a centralized, accessible location.

We also suggest advocating for a data normalization initiative within the organization to scrub and properly label the data so you understand what data you have, how it鈥檚 being posted, and what features are available within the datasets.

Organizations in the early stages of maturity in terms of data normalization may not be equipped to jump right into insight extraction through AI and machine learning. For these companies, it鈥檚 important to prioritize the use cases they want to address鈥攆raud detection, customer experience enhancements, operational efficiency improvements, for example鈥攁nd determine how to plug in the right tools, technologies, and advanced analytics to leverage the data once it鈥檚 available.

The excerpt was taken from 乐鱼(Leyu)体育官网 article, All hands on deck: Key cyber security considerations for 2020鈥�.

乐鱼(Leyu)体育官网

漏 2025 R.G. Manabat & Co., a Philippine partnership and a member firm of the 乐鱼(Leyu)体育官网 global organization of independent member firms affiliated with 乐鱼(Leyu)体育官网 International Limited, a private English company limited by guarantee. All rights reserved.

 

For more detail about the structure of the 乐鱼(Leyu)体育官网 global organization please visit /governance.

Connect with us