Which process are you keen the most about automating?
Compliance management24%
New employee onboarding25%
Permissions management20%
Security incident management16%
Alert prioritization & review10%
Other (comment below)4%
1213 PARTICIPANTS
IT Analyst in Services (non-Government), 2 - 10 employees
Security incidentPrincipal / Manager in Education, 11 - 50 employees
Network (Endpoint) monitoring, with summary log reporting / push notification.IT Manager in Education, 2 - 10 employees
Thanks for these questions
no title, Self-employed
Well, I would say that ideally, it would be best to automate everything, so-called Cyber resilience, but at the same time have a team of professionals who are going to view the cases for false-positive alerts. To make things short, a SOC team. But If I am going to choose one of the options above, EDRs surely need to be implemented.IT Manager in Media, 51 - 200 employees
Employee off-boarding. Our company is small and so on-boarding is more personal and individualized. But off-boarding can be much more automated.Information Security Manager in Construction, 1,001 - 5,000 employees
User issues, issue resolution status, issue resolutionManager, Security Operations and Compliance in Finance (non-banking), 51 - 200 employees
Compliance management mixed with incident response. Essentially implementing compliance into SOAR :)Content you might like
Yes41%
No15%
Sometimes42%
8313 PARTICIPANTS
Training and Assessment Operations in Education, 501 - 1,000 employees
Switching to hardware keys for MFA can be challenging sometimes as authentication layers can sometimes be slightly incompatible to the device or applications and pose authentication issueCompany financial stability56%
Industry trends46%
Length of time in business44%
Recent layoffs or restructuring44%
Employee turnover rate38%
Compensation34%
Culture37%
Blindly following Review sites (eg. GlassDoor)5%
Other(s)2%
361 PARTICIPANTS
IT Manager in Transportation, 10,001+ employees
Always remember about Risk Assessment. Conduct a thorough risk assessment to identify potential data loss risks and vulnerabilities. Use this assessment to prioritize DLP efforts.