About Digital Shadows
Digital Shadows minimizes digital risk by identifying unwanted exposure and protecting against external threats. Organizations can suffer regulatory fines, loss of intellectual property, and reputational damage when digital risk is left unmanaged. Digital Shadows SearchLight™ helps you minimize these risks by detecting data loss, securing your online brand, and reducing your attack surface. To learn more and get free access to SearchLight, visit www.digitalshadows.com
Automation in IT certainly isn’t a new concept.
Systems administrators have long held the view that if a task needs doing more than once, it’s worth automating. There’s any number of open source and commercial tools for that. But what about those of us with limited time or skills?
The investment required to purchase tools, the learning curve required to skill up to fully utilise those tools, and the even steeper learning curve of piecing together open source projects which work in your unique environment can all be overwhelmed by the priorities are already consuming every available hour. We’re constantly told that the proactive nature of automation will make our jobs easier, allow us to see and react to more threats, but scepticism tells us otherwise. The actual goal of automating should be “allow humans to perform the tasks they’re best at” rather than to simply replace humans.
With this in mind, there’s a number of techniques that we’ll discuss with our expert guest, Michael Marriott.
Using data analysis to lower the chance of human error, increase predictability and reduce mundane tasks are all well known concepts, but what learnings can we take away from those who’ve trailblazed ahead of us? Leaked credentials and/or confidential data is a regular consideration on any organisation’s risk register.
Not withstanding the limitations mentioned above, can we apply automation using our existing investments in IT environments to help mitigate this risk?
Michael Marriott is a Senior Product Marketing Manager at Digital ShadowsMichael has a passion for security analysis and the trends they indicate, in order to better protect clients. He has written several articles and papers, and his research is regularly features in the press. He holds a BA in History and a Masters in Applied Security and Strategy, both from the University of Exeter.
This webinar session will be hosted and moderated by Mike Holm, AusCERT Senior Manager and Geoff Thonon, AusCERT Operations Manager.