author photo
By Bruce Sussman
Fri | Jul 13, 2018 | 7:35 AM PDT

What have you automated in your life?

Maybe your bills automatically get paid, on time, each month.

Maybe your calendar program has automatically booked the conference room every Tuesday at 10 a.m., until the end of time.

Or perhaps it is the three jugs of drinking water that magically show up on the porch every week, all year long.

Automation can help you move these items from your "to do" list to your "to done" list so you can give your time to more important things.

Security automation and orchestration

And when it comes to automation and orchestration in security, Deputy CISO at Partners HealthCare Esmond Kane says we've gotten to the point where it is "automate or die." By the way, this was the name of his recent session at SecureWorld Boston.

What is it time for InfoSec to automate? 

“We know cybercriminals have industrialized their operations. These highly organized professionals seek to shut your business down mere minutes after exploitation and demand ransoms optimized to your industry and size. It is a necessity to build an agile and adaptive next-generation Security Operations Center (SOC) to disrupt these ruthless entrepreneurs.”

And that next-gen SOC demands automation and orchestration—but not everywhere. "You have to be careful how you adopt it, it doesn't lend itself to unstructured processes," he says. Watch our 2-minute interview with Kane for more on where to start on security automation and orchestration. 

"My recommendation would be when you're looking to automate something, look at a very binary process, something you can put bounds around."

3 areas InfoSec teams can leverage

Kane put orchestration on his list of three key areas Information Security teams can leverage now to do more in today's threat environment:

  1. Workload optimization
  2. Mature threat intelligence and management
  3. Infrastructure integration and orchestration

Still short on security talent at your shop? Security automation and orchestration can help.

Tags: Cybersecurity,
Comments