Intelligent CIO Middle East Issue 42 | Page 41

/////////////////////////////////////////////////////////////////////// but it’s unclear of how it all fits together in the big picture of your security status. To close security gaps and take a holistic approach to securing your environment, three key ingredients are needed: data integration, contextual analysis and intelligence-driven processes. Make centralising your data repositories a priority To start closing the security management gap, you first need to create complete, www.intelligentcio.com FEATURE: SECURITY MANAGEMENT centralised data repositories. These repositories will need to be updated frequently (usually daily in enterprise environments) and accessible on demand by multiple teams, processes and technologies. In order for the centralised repository to be useful, you need to ensure that you automate the regular collection, normalising and merging of data from all cyber-relevant sources in your organisation: Ziad Sawtari, Regional Director for the Middle East, Skybox Security INTELLIGENTCIO 41