{"id":63350,"date":"2022-11-09T03:37:00","date_gmt":"2022-11-09T08:37:00","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=63350"},"modified":"2022-11-09T03:37:00","modified_gmt":"2022-11-09T08:37:00","slug":"making-the-case-for-security-operation-automation","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2022\/11\/09\/making-the-case-for-security-operation-automation\/","title":{"rendered":"Making the case for security operation automation"},"content":{"rendered":"\n<p><strong>By\u00a0<a href=\"https:\/\/www.csoonline.com\/author\/Jon-Oltsik\/\">Jon Oltsik<\/a><\/strong> &#8211; According to\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.esg-global.com\/research\/esg-research-soc-modernization-and-the-role-of-xdr\" target=\"_blank\">ESG research<\/a>, 52% of organizations believe that<strong> security <\/strong>operations are more difficult today than they were two years ago, due to factors such as the dangerous threat landscape, growing attack surface, and the volume\/complexity of <strong>security <\/strong>alerts. In analyzing this data, I see a common theme: scale. <strong>Security<\/strong> teams must be able to scale operations to deal with the increasing volume of everything coming at them. Faced with a global cybersecurity skills shortage, CISOs need alternatives to hiring their way out of this quagmire.<\/p>\n\n\n\n<p>How can organizations proceed? By automating <strong>securit<\/strong>y operations processes. ESG research reveals that nearly half (46%) of security operations center (SOC) teams are automating<strong> security <\/strong>operations processes \u201cextensively,\u201d while another 44% are automating security operations processes \u201csomewhat.\u201d<\/p>\n\n\n\n<p>When it comes to <strong>security<\/strong> operations process automation, one might equate this activity with <strong>security<\/strong> orchestration, automation, and response (SOAR) technology. In some cases, this is a correct assumption, as 37% of organizations use some type of commercial\u00a0<a href=\"https:\/\/www.csoonline.com\/article\/3617078\/5-tips-for-getting-started-with-soar.html\">SOAR<\/a>\u00a0tools. Interestingly, more than half (53%) of organizations eschew SOAR, using <strong>security<\/strong> operations process automation functionality within other <strong>security<\/strong> technologies instead \u2013\u00a0<a href=\"https:\/\/www.csoonline.com\/article\/2124604\/what-is-siem-security-information-and-event-management-explained.html\"><strong>security<\/strong> information and event management (SIEM)<\/a>, threat intelligence platforms (TIPs), IT operations tools, or\u00a0<a href=\"https:\/\/www.csoonline.com\/article\/3665913\/5-things-security-pros-want-from-xdr-platforms.html\">extended detection and response (XDR)<\/a>, for example. Those organizations using SOAR admit that it is no day at the beach \u2013 80% agree that using SOAR was more complex and time consuming than they anticipated.  <a rel=\"noreferrer noopener\" href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.csoonline.com\/article\/3678355\/making-the-case-for-security-operation-automation.html&amp;ct=ga&amp;cd=CAEYBCoTNTQ1MTQ1MTY3Mjc3NTUzNjg2NDIaNGFjOTI3ZjdkYTNiM2I1YTpjb206ZW46VVM&amp;usg=AOvVaw1lcajN4EHwrMgks-j3_V0S\" target=\"_blank\">Read On:<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By\u00a0Jon Oltsik &#8211; According to\u00a0ESG research, 52% of organizations believe that security operations are more difficult today than they were two years ago, due to factors such as the dangerous threat landscape, growing attack surface, and the volume\/complexity of security <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2022\/11\/09\/making-the-case-for-security-operation-automation\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":63351,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[14],"tags":[150],"class_list":["post-63350","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-security"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/63350","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=63350"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/63350\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=63350"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=63350"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=63350"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}