Efficiency of Alerts - How Not To Be Hacked

Efficiency of Alerts - How Not To Be Hacked

The greatest chance we have to better the products we depend on daily is through ensuring the highest quality, most efficient delivery, and meeting our user's expectations. This has the makings of a classic Management textbook (such as the extremely valuable Peter Drucker) or Gary's book on Leading Agile Transformation, a superb book on establishing cutting edge product development practices in today's world.

That crossover effect is the key and a study done under the concept of DevOps developed a great metric that those in product development, management, and operating cybersecurity organizations can adopt today. It is simple in concept but the rewards are tremendous. I'd be happy to discuss the implementation considerations and how this applies in the comments or offline as you like.

The problem statement of this concept to adopt today is:

An impediment to working on the right problems is the phenomenon of redundant alerts or missing alerts.

To address this we must establish alerting efficiency across your organization, products, and teams. These should be automated, intelligent, and yes will mature over time. Start on the highest impact (revenue pipeline; areas of risk; cost where penalties historically reside; rework)

This concept is shared from the great DevOps work sessions that came out of the DevOps Enterprise Conference 2015. All of the videos are online and free. Enjoy!

The concept of this article series is to share the most operationally impactful insights to secure and better our lives around technology. The title is moniker off of the book written for your family, friends, and grandparents on how to be SAFE online and embodies the habits of information security professionals from around the world. You can find it here in both a beautiful printed book or in Kindle.

Thank you,

James

B. Scott Hudgins

Client Executive - Anthem National Accounts

8y

Well said James! We must be agile in many areas, not just from a security standpoint, to survive and thrive as an organization. Keep up the great guidance and insight!

Like
Reply

To view or add a comment, sign in

Insights from the community

Explore topics