ISM3013C Final Project Phase 3 PDF

Title ISM3013C Final Project Phase 3
Course Information Systems Control
Institution Broward College
Pages 6
File Size 91.2 KB
File Type PDF
Total Downloads 54
Total Views 129

Summary

Table of Contents
Why SIEM Projects Fail (phase 3) 3
SIEM is very complexe 3
Lack of Training 3
Lack of Goals and fixed Objectives 4
Using SIEM mainly for compliance 4
Value of SIEM is not fast 5
Lack of security knowledge 5
References 6

 ...


Description

Data Security Management

Data Security Management Alissia Saquer Broward College ISM3013C Information System Management Professor Todd Price Due one January 24th,2021

1

Data Security Management

2

Table of Contents Why SIEM Projects Fail (phase 3)...............................................................................................3 SIEM is very complexe..............................................................................................................3 Lack of Training.........................................................................................................................3 Lack of Goals and fixed Objectives..........................................................................................4 Using SIEM mainly for compliance.........................................................................................4 Value of SIEM is not fast...........................................................................................................5 Lack of security knowledge.......................................................................................................5 References.......................................................................................................................................6

Data Security Management

3

Why SIEM Projects Fail (phase 3) SIEM is a strong security device when installed correctly. Collecting, understanding and accomplishing the gains of utilizing a SIEM device can be difficult and several companies fall short in doing so. Sadly, if you’re not fulfilling the worth of SIEM it can make your company at risk of an exploit.

SIEM is very complexe The SIEM is difficult to utilize, just gathering logs will not increase the worth of your SIEM distribution and can swiftly be unsuccessful. You need to flip the log details into functional understanding. To accomplish this, your workforce needs to make the logs intelligible. Your workforce will have to organize correlation guidelines to filter through the massive scale of log serials and make transparent security insights

Lack of Training If you’ve devoted inner assets to controlling your SIEM, you could separate the correct training and growth for your workforce. SIEM solutions can be difficult at times and without the correct understanding, your solution may fail and become a bad financial decision for your company. Throughout the onboarding procedure, ensure your workforce comes ready to ask as many questions as they can.

Data Security Management Lack of Goals and fixed Objectives Failing to place assumptions, objectives and targets may result in the SIEM project being unsuccessful. Similarly, your assumptions and objectives should be parallel, and you should acquire a buy in from stakeholders at all stages. Every individual is required to be good with the distribution and results of the SIEM. To coax your management team, you must interpret the benefits into how it profits the company. As for the security team, you must choose and express objectives that the team can achieve. Ensure your security and management team have an understanding of key products and project achievements. This will make the distribution of the SIEM a lot easier.

Using SIEM mainly for compliance SIEM formed as a convenient device for controlling consent. Gradually, it’s become one of the most consolidated forum for controlling security in the company. If your workforce is having difficulty in searching for security usefulness for your SIEM you may need to take a thorough view on how it could be utilized more effectively.

Value of SIEM is not fast It’s probable that your security team needs a response but maybe your SIEM is taking longer than expected to deliver a value. After you’ve resolved the problem you then need to implement threat insight to assist enhance threat identification. Implementing threat insight into your SIEM creates an overall better security.

4

Data Security Management

Lack of security knowledge Throughout the preparations and coordination stage, if you didn’t decide the assets needed to control the SIEM you may be in for some difficulty. A SIEM solution can make you front a large amount of capital and without assets it can be a pointless device. An important negligence for companies is not possessing any or sufficient assets to control the SIEM. Without assets, your SIEM is improbable to produce the outcome you desire. Numerous frequently contemplate controlled SIEM if they directly

5

Data Security Management

References Burny, H. (2010), Identify why SIEM Fails. Zope, A.R, (2013). Data minding approach in security information and event management. Kotenko and A. Chechulin, "Common Framework for Attack Modeling and Security Evaluation in SIEM Systems," 2012 IEEE International Conference on Green Computing and Communications, Besancon, 2012, pp. 94-101, doi: 10.1109/GreenCom.2012.24.

6...


Similar Free PDFs