Our IT Security Legacy

What are we leaving for the next generation of security professionals?

Fact – the attack surface is growing. Be it digitization, threat development, hybrid environments, cloud migration dynamics, or the number of resources needed to ensure the environment is secure.

We have a choice. Our inheritance could either be cyber security “debt”, an assembly of systems without the ability to monitor, track, audit, and control policy enforcement, or an automated security operation that drives constant improvement.

There’s only one path to gaining back control – automation. True automation does not require more headcount, and should even release a few to do other tasks.