Optiv Security and Momentum Cyber White Paper Defines the Five Trends and Technologies that will Relieve the Cyber Security Skills Shortage

Optiv Security and Momentum Cyber White Paper Defines the Five Trends and Technologies that will Relieve the Cyber Security Skills Shortage

DENVER - August 21, 2018 - Optiv Security and Momentum Cyber have published a new white paper entitled "E is for Efficiency," which discusses the five key trends and technologies that will dramatically reduce the impact of the cyber security skills shortage by creating much greater efficiency in enterprise security programs. The paper details the state of the cyber security skills shortage, which is projected to hit 1.8 million jobs by 2022. “E is for Efficiency” then defines the five key technologies and trends in security that promise to lessen or even eradicate this problem:

 

  • Machine Learning: Prior to Machine Learning, security was significantly more manpower intensive, relying on people and their knowledge to detect, investigate, report and remediate, with a large percentage of the actions taken by security teams being repetitive. The skills shortage, combined with the ever-increasing need for organizations to achieve efficiency, necessitates new technologies to accelerate time to detection, response and recovery. By strategically implementing machine learning to areas where it will save time and improve effectiveness, enterprises can eliminate wasteful triage processes that rely on analysts sifting through piles of data and alerts to find actual threats. Machine Learning also provides organizations with actionable intelligence to streamline workload and workflow processes.
  • Platform Consolidation: Several security vendors have been building out security platforms through technology acquisition and new feature development. These integrated platforms provide interconnected functionality, which enables consolidated management that is far more efficient than managing disparate point tools.
  • Security Integration: Having multiple security tools generating data and alerts can create a cacophony of useless “noise” in a security organization. By integrating tools, organizations can dramatically speed up detection and response. For example, if an endpoint tool detects an infected laptop, it can trigger changes to firewalls to block the malware from communicating with its command-and-control host. However, while most tools have APIs for integration, they often are limited – so security pros should factor API quality into their buying decisions when procuring security tools, since they are critical to creating a truly integrated security stack.
  • Automation and Orchestration: Security automation and orchestration accelerates the movement of data between tools for the purposes of threat prioritization, response amplification, labor reduction and consistent workflow. This sector of security has seen massive investment and adoption, due to its promise to relieve security personnel of routine manual labor, and to implement effective workflows.
  • Continuous Security Validation: Once these integration, consolidation and automation strategies are in place, enterprises must have systems to test that their security controls are properly configured over the course of time, even as network changes are made. Continuous security validation tools automate and speed the process of identifying misconfigured security tools and network devices.

 

When combined, these five trends and technologies eliminate enormous amounts of manual labor while improving overall security posture, through the reduction of human error, more effective use of on-staff expertise, and the use of continuous security validation. By automating manual tasks, they also relieve enterprises and service providers from the requirement of continually hiring more security professionals to manage an ever-growing infrastructure, thus curbing or even eliminating the impact of the cyber security skills shortage.

 

If you are a member of the media interested in further analysis on any of the issues addressed in “E is for Efficiency,” please contact Jason Cook at Jason.Cook@optiv.com or (816) 701-3374 or Kim Hughes at Kim@blueshirtgroup.com of (415) 516-6187.

 

Follow Momentum Cyber

LinkedIn: https://www.linkedin.com/company/momentumcyber/

Twitter: https://twitter.com/MomentumCyber

Newsletter: https://momentumcyber.com/intel/

 

About Momentum Cyber

Momentum Cyber is the premier trusted advisor to the cyber security industry providing bespoke high-impact advice combined with tailored, senior-level access. The firm was founded by world-class operators and advisors and caters to the unique needs of both earlier stage founders, CEOs, & boards as well as the complexity of later stage & public companies throughout their lifecycle – incubation to exit. Headquartered in San Francisco with operations globally, the senior team has closed over 250 transactions totaling over $250 billion in value. Momentum Cybersecurity Group, LLC conducts its M&A advisory services as an M&A Broker as defined by the SEC. For more information, visit www.momentumcyber.com.

Optiv Security: Secure greatness.®

Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate complete cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can. At Optiv, we manage cyber risk so you can secure your full potential. For more information, visit www.optiv.com.

Would you like to speak to an advisor?

How can we help you today?

Image
field-guide-cloud-list-image@2x.jpg
Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation
Image
OptivCon
Register for an Upcoming OptivCon

Ready to speak to an Optiv expert to discuss your security needs?