///////////////////////////////////////////////////////////////////////
but it’s unclear of how it all fits together
in the big picture of your security status.
To close security gaps and take a holistic
approach to securing your environment,
three key ingredients are needed: data
integration, contextual analysis and
intelligence-driven processes.
Make centralising your data
repositories a priority
To start closing the security management
gap, you first need to create complete,
www.intelligentcio.com
FEATURE: SECURITY MANAGEMENT
centralised data repositories. These
repositories will need to be updated
frequently (usually daily in enterprise
environments) and accessible on
demand by multiple teams, processes
and technologies.
In order for the centralised repository
to be useful, you need to ensure that
you automate the regular collection,
normalising and merging of data from
all cyber-relevant sources in
your organisation:
Ziad Sawtari, Regional Director for the
Middle East, Skybox Security
INTELLIGENTCIO
41