ITSPmagazine Podcast Network

Log's Honest Truth — Confessions Of Cybersecurity Consultant | A Confession From Ms H | A Devo Story With Kayla Williams

Episode Summary

When climbing to reach the summit for the business, a security management failure can happen at any moment, resulting in missed opportunities or lost revenue. The good news? Your logs have the solutions.

Episode Notes

When climbing to reach the summit for the business, a security management failure can happen at any moment, resulting in missed opportunities or lost revenue. The good news? Your logs have the solutions.

We're not only talking about finding the solution to fix problems when it is too late. We're talking about focusing the resources on knowing the business and its risks before something terrible happens so you can better prepare, protect, and prevent the mishap in the first place. If you listen to the logs, the solution can be synonymous with prevention.  

In this conversation, we speak with Kayla Williams, VP, IT GRC at Devo, about the confession "Ms. H" shared with the Devo team. "Ms. H" described 3 main challenges faced:

The wall of "Un-Scalability": what makes a company to that point where the wall is too tall to scale?

Analytics: you can't magically know what you don't know, and you can't analyze what you can't see

What is the real impact on the team's performance in terms of MTTD and MTTR? Yes, this applies to compliance requirements as well.

These points likely resonate with many preparing to listen to this episode. Still, the challenges—and opportunities—may not be as obvious.

Security operations programs within any organization can only mature and progress as fast as its weakest point. And, for many, that weakest spot lives in their ability to collect, correlate, analyze, and act on enough relevant data from enough (let's be honest, "all") relevant sources.

What's the reality? Many hit the "wall of un-scalability" far too soon for them to be successful as they try to reach the summit. They simply can't see what needs to be seen to prepare, protect, and prevent.

Suppose we learn to listen to the cybersecurity practitioners that know what is really needed to get the job done. In that case, we can also learn to listen to the log's truth—as they do not lie.

More Data. More Clarity. More Confidence.

(This contains promotional content: learn more)

With Power Comes Responsibility: Not All SIEM Platforms Are Created Equally

Conversation with: Kayla Williams, VP, IT GRC at Devo
Confession shared by: “Ms H”

Resources
Learn more about Devo and their offering: https://itspm.ag/itspdvweb

Watch all of the Log's Honest Truth videos by visiting https://itspm.ag/devooa7k

Catch the full 5-part video/podcast series by visiting https://itspmagazine.com/their-stories/their-identities-are-hidden-but-their-frustrations-are-not-infosec-confessions-logs-honest-truth-a-devo-story

Are you interested in telling your story?
https://www.itspmagazine.com/telling-your-story