Compliance management24%

New employee onboarding25%

Permissions management20%

Security incident management16%

Alert prioritization & review10%

Other (comment below)4%


7k views33 Upvotes7 Comments

IT Analyst in Services (non-Government), 2 - 10 employees
Security incident
Principal / Manager in Education, 11 - 50 employees
Network (Endpoint) monitoring, with summary log reporting / push notification.
1 1 Reply
IT Manager in Education, 2 - 10 employees

Thanks for these questions

no title, Self-employed
Well, I would say that ideally, it would be best to automate everything, so-called Cyber resilience, but at the same time have a team of professionals who are going to view the cases for false-positive alerts. To make things short, a SOC team. But If I am going to choose one of the options above, EDRs surely need to be implemented.
IT Manager in Media, 51 - 200 employees
Employee off-boarding. Our company is small and so on-boarding is more personal and individualized. But off-boarding can be much more automated.
Information Security Manager in Construction, 1,001 - 5,000 employees
User issues,  issue resolution status, issue resolution
Manager, Security Operations and Compliance in Finance (non-banking), 51 - 200 employees
Compliance management mixed with incident response. Essentially implementing compliance into SOAR :)

Content you might like





70.5k views166 Upvotes58 Comments

Training and Assessment Operations in Education, 501 - 1,000 employees
Switching to hardware keys for MFA can be challenging sometimes as authentication layers can sometimes be slightly incompatible to the device or applications and pose authentication issue
Read More Comments
2k views36 Upvotes5 Comments

Company financial stability56%

Industry trends46%

Length of time in business44%

Recent layoffs or restructuring44%

Employee turnover rate38%



Blindly following Review sites (eg. GlassDoor)5%



4.5k views7 Upvotes3 Comments

IT Manager in Transportation, 10,001+ employees
Always remember about Risk Assessment. Conduct a thorough risk assessment to identify potential data loss risks and vulnerabilities. Use this assessment to prioritize DLP efforts.
Read More Comments
2k views1 Upvote3 Comments