Optiv + $1B Retail Manufacturer = a Security Operations Strategy Makeover

 

Download

The Situation – an underdeveloped security operations center (SOC)

 

A $1B global retail manufacturer needed a security strategy makeover. As a publicly traded organization that distributes and sells apparel online and via hundreds of brick-and-mortar retail outlets, having effective security controls and risk management policies in place is critical. While they had a cloud-first mentality, their current security strategy had risky gaps and was complicated by excessive, noisy vendor relationships. The board of directors and executive leadership grew increasingly concerned that they were not seeing improvement in risk posture.

 

The Solution – a holistic roadmap to operational risk improvement

 

To better understand our client’s desired risk profile, we dove right in with a comprehensive executive briefing, followed by six weeks of deep discovery – to align solutions to the strategy and risk roadmap. Our diverse team of technical and security experts created a holistic managed security operations program mapped to 15 areas of operational risk improvement, including SIEM (security and event management) optimization. Optiv addressed multiple operational gaps within a single initiative and single statement of work, with the goal of improving people, processes and technology.

Industry Served: Retail


Our Starting Point

  • Heightened operational risk, disjointed projects and vendor overload
  • Board of directors and executive leadership team calling for immediate resolution
  • Lack of strategic alignment around goals and objectives
  • Outdated legacy security systems, IT debt and misaligned staff costs and risk

Accelerating Forward

  • Developed a comprehensive security operations program:
    • SIEM optimization and management
    • Tools upgrade and implementation
    • Proactive and reactive services
  • Implemented a vulnerability management program:
    • Attack surface management (ASM) and risk reduction
    • Incident management and forensics
    • Security awareness training for staff
  • Established overall program management and executive service

Client Outcomes

  • Improved 15 areas of operational risk
  • Displaced multiple vendors, preventing further risk
  • Transferred costs and risk to Optiv
  • Leveraged methodology across a portfolio of cybersecurity services
  • Realigned and uplifted client’s staff
  • Client empowered to make knowledgeable decisions to lower overall business risk
  • Extending security operations into cloud, identity and data management functions
  • Continual improvement through annual assessments

How can we help you secure greatness?

 

Optiv can advise on, deploy and operate end-to-end cybersecurity programs aligned to your business goals. As the cyber advisory and solutions leader, we serve nearly 6,000 companies across every major industry. Our certified experts can help you gain the agility, security, scale and control you need to stay ahead of the competition.

 

Would you like to speak to an advisor?

How can we help you today?

Image
field-guide-cloud-list-image@2x.jpg
Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation
Image
OptivCon
Register for an Upcoming OptivCon

Ready to speak to an Optiv expert to discuss your security needs?