Tuesday, November 28, 2023
Security Boulevard
The Home of the Security Bloggers Network
Community Chats Webinars Library
Home
Cybersecurity News
Features
Industry Spotlight
News Releases
Security Bloggers Network
Latest Posts
Syndicate Your Blog
Write for Security Boulevard
Webinars
Upcoming Webinars
Calendar View
On-Demand Webinars
Events
Upcoming Events
On-Demand Events
Sponsored Content
Chat
Security Boulevard Chat
Marketing InSecurity Podcast
Techstrong.tv Podcast
TechstrongTV - Twitch
Library
Related Sites
Techstrong Group
Cloud Native Now
DevOps.com
Security Boulevard
Techstrong Research
Techstrong TV
Techstrong.tv Podcast
Techstrong.tv - Twitch
Devops Chat
DevOps Dozen
DevOps TV
Media Kit
About
Sponsor
Analytics
AppSec
CISO
Cloud
DevOps
GRC
Identity
Incident Response
IoT / ICS
Threats / Breaches
More
Blockchain / Digital Currencies
Careers
Cyberlaw
Mobile
Social Engineering
Humor
Hot Topics
Ddostf DDoS Botnet Malware Targets MySQL Servers
Safeguarding Against Security Misconfigurations with the Power of Machine Learning
Another Look at Accountability in Cybersecurity
Disable Windows Event Logging – Security Spotlight
IPStrom Takedown Russian Mastermind Pleads Guilty
Kenneth Balibalos
Lightspin Blog
The Beginner’s Guide to Attack Paths
Kenneth Balibalos
|
July 22, 2022
|
FEATURED
Description: Why the future of cloud security is about seeing like an attacker ...
Read More
Lightspin Blog
Integrated Security Data
PulseMeter
Step
1
of
7
14%
What percentage of your organization’s security data is integrated into a SIEM or data repository you manage? (Select one)
(Required)
100%, or nearly 100%
75-99%
51-74%
26-50%
1-25%
0%
What gaps exist in your current SIEM, observability and monitoring systems? (Select one or more)
(Required)
Unable to view security and compliance across all systems in the enterprise
Needed data isn’t accessible; locked in silos
Lack organizational information necessary to provide sufficient visibility
Complete data is much too large or expensive to aggregate into one system or data storage
Security data lacks a consistent schema or definition
Rate how well your security team currently meets the needs of the business in the following (select one for each item):
(Required)
Excellent
Above Average
Average
Below Average
Poor
N.A.
Incident response
Threat hunting
Real-time compliance monitoring
Security controls monitoring
Privacy auditing
Security compliance
Risk assessment or modeling
How are data silos impacting your security operations and compliance? (Select one)
(Required)
Causing significant delays in investigations
Some delays due to manual data consolidation
Occasional delays when investigating across tools
Data is well integrated so minimal impact
No major problems from data silos yet
When improving your security data workflow, rank the following in order of importance (rank order):
Integrating data across silos
Enabling real-time security and compliance reporting
Standardizing data schema, such as OCSF or ECS
Automate data cleansing and integration into common datastore
Integrate organizational data and business logic with security data
Stay ahead of threats and privacy data regulations
Which of the following do you currently integrate with security data? (Select one or more)
(Required)
Asset discovery and ownership
Org charts including employee information
Financial data
Customer data
Policy and compliance data
IT monitoring or observability data
None
What is the size of your company (number of employees)? (Select one)
(Required)
1-99
100-999
1,000-4,999
5,000-9,999
10,000+
Δ