Time
1 hour 2 minutes
Difficulty
Advanced
CEU/CPE
1

Video Transcription

00:02
a large organization may need or have more than 100 security technologies to protect the environment. You know, tools for all is very real. If they can reduce that complexity, the jobs everybody's jobs will be a lot easier
00:19
because they wouldn't have to worry about having too many systems to manage
00:23
a lot of times as security practitioners, you know, we like our tools. But
00:28
how? How much time a day are your teams spending managing tools versus managing security? Getting multiple alerts won't help either, if the security systems are not integrated. Know how many different
00:41
dashboards are your security teams bouncing in between the day? Is it all you know, become a noise? Do have a lot of false positives?
00:50
Um so integrated security eliminates the costs and hassle again a provisioning and managing and scaling security software for each individual workload.
01:00
This results in a fast and consistent
01:03
I said again fast and consistent delivery of the newest security technologies and updates.
01:11
Organizations must simplify the complexity of the information security management,
01:17
um, by reducing tools,
01:19
reducing friction,
01:22
but increasing productivity by on Lee
01:26
um, you know, producing actionable alerts.
01:33
I like to look at this as the kiss principle.
01:37
Keep it stupid. Simple.
01:40
This is a desire cripple principle that was noted by the US Navy in 1960.
01:47
The Kiss Principle states that the most systems were best if they had kept simple rather than make complicated. I repeat that again. The kiss principle states that
01:59
most systems work best if they are kept simple rather than make complicated. Therefore, simplicity should be a key goal in design, and unnecessary complexity should be avoided at all costs.
02:15
So
02:16
let that brief for him. Home it
02:19
unnecessary complexity should be avoided.
02:23
How many times have we present company included? Rolled out new security tools or nous? It is processes procedures that were overly complex
02:35
just for the sake of checking a box
02:38
or solving
02:40
what we see as a huge problem. But if we step back and took a whole list it look at it. It really wasn't.
02:49
And we've been
02:51
blocking productivity.
02:59
So this leads isn't too knowing.
03:01
The business mission,
03:04
Um, cybersecurity is not a I t. Issue. It's a business issue.
03:08
Do you know what the mission of East Department is? Do you know where the critical assets and data are
03:16
What's the best approach to usable security?
03:21
These are a couple of questions that you can use
03:23
to get started when you reach out to teams. Department has center.

Up Next

Revenue Protection as a CISO

In this course you will learn strategies to transform the way your security program is viewed.

Instructed By

Instructor Profile Image
Terence Jackson
Chief Information Security and Privacy Officer
Instructor