Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
    • By Category
      • AI/Hyperautomation
      • Cloud/Cloud Wars
      • Cybersecurity
      • Data
    • By Interest
      • Leadership
      • Office of the CFO
      • Partners Ecosystem
      • Sustainability
    • By Industry
      • Financial Services
      • Healthcare
      • Manufacturing
      • Retail
    • By Type
      • Guidebooks
      • Digital Summits
      • Practitioner Roundtables
      • Practitioner Playlists
    • By Language
      • Español
  • Vendor Shortlists
    • All Vendors
    • AI/Hyperautomation
    • Cloud
    • Cybersecurity
    • Data
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
Twitter Instagram
  • CIO Summit
  • Summit NA
  • Dynamics Communities
Twitter LinkedIn
Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
        • By Category
          • AI/Hyperautomation
          • Cloud/Cloud Wars
          • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
          • Data
        • By Interest
          • Leadership
          • Office of the CFO
          • Partners Ecosystem
          • Sustainability
        • By Industry
          • Financial Services
          • Healthcare
          • Manufacturing
          • Retail
        • By Type
          • Guidebooks
          • Digital Summits
          • Practitioner Roundtables
          • Practitioner Playlists
        • By Language
          • Español
  • Vendor Shortlists
    • All Vendors
    • AI/Hyperautomation
    • Cloud
    • Cybersecurity
    • Data
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
    • Login / Register
Acceleration Economy
    • Login / Register
Home » How Brainstorming With Data-Driven Teams Can Expedite Cybersecurity Outcomes
Cybersecurity as a Business Enabler

How Brainstorming With Data-Driven Teams Can Expedite Cybersecurity Outcomes

Robert WoodBy Robert WoodFebruary 24, 2023Updated:February 24, 20231 Min Read
Facebook Twitter LinkedIn Email
To adjust the volume hover the cursor over the volume bar

Playlist: How to Protect Critical Data

Chris Hughes1/6
  • 1
    How Brainstorming With Data-Driven Teams Can Expedite Cybersecurity OutcomesRobert Wood
  • 2
    How to Enforce Cybersecurity When Managing Third-Party DataWayne Sadin
  • 3
    Why Data Silos Create Cybersecurity Risks and How to Break Them DownRobert Wood
  • 4
    Why Cybersecurity Teams Should Centralize Their Data for Better Threat DetectionRobert Wood
  • 5
    From PII to Passwords: How CISOs Deploy Cybersecurity Tools to Protect Sensitive DataFrank Domizio
  • 6
    Cloud Data Strategy, Analytics, and GovernanceWayne Sadin
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

In episode 50 of the Cybersecurity Minute, Rob Wood explores what cybersecurity can learn from data-driven teams.

This episode is sponsored by Acceleration Economy’s Digital CIO Summit, taking place April 4-6. Register for the free event here. Tune in to the event to hear from CIO practitioners discuss their modernization and growth strategies.

Highlights

00:23 — Cybersecurity has a lot to learn from data-driven teams within their own organizations, Rob says.

00:45 — Insights from these data-driven teams include application telemetry and debugging logs, which can be invaluable from a security standpoint.

Insights into Why & How to Recover from a Cybersecurity Breach
Guidebook: Cybersecurity Breach and Recovery Response

01:01 — To prepare for communication with these data-driven teams, Rob encourages cybersecurity teams to explore “the root problems that you’re trying to solve through log ingestion and detection and alerting and such” while you “lean into” their expertise.

01:23 — Take the results of the exploration and go brainstorm with the data-driven teams that might be able to help. Rob thinks that with this strategy, security teams will find data or telemetry that will either solve the problem or positively contribute to finding a solution.

01:47 — Rob sums up the major benefits of this strategy, which positions cybersecurity to become a secondary stakeholder of some data. Security teams might be surprised at how much can be accomplished based on what’s already in an organization.


Want more cybersecurity insights? Subscribe to the Cybersecurity as a Business Enabler channel:

Acceleration Economy Cybersecurity

CIO data featured security teams
Share. Facebook Twitter LinkedIn Email
Analystuser

Robert Wood

CISO
Executive Branch Agency

Areas of Expertise
  • Cybersecurity

Robert Wood is an Acceleration Economy Analyst focusing on Cybersecurity. He has led the development of multiple cybersecurity programs from the ground up at startups across the healthcare, cyber security, and digital marketing industries. Between experience with startups and application security consulting he has both leadership and hands on experience across technical domains such as the cloud, containers, DevSecOps, quantitative risk assessments, and more. Robert has a deep interest in the soft skills side of cybersecurity leadership, workforce development, communication and budget and strategy alignment. He is currently a Federal Civilian for an Executive Branch Agency and his views are his own, not representing that of the U.S. Government or any agency.

  Contact Robert Wood ...

Related Posts

How Technology Ecosystem Partners Advance Digital Transformation Projects

March 25, 2023

SAP Expands Big Advantage It Has Over Oracle, Salesforce, Workday

March 24, 2023

How Teradata’s Vantage Cloud Lake Helps Customers Reduce Cloud Spend

March 24, 2023

Why Context Matters When Cybersecurity Leaders Communicate With Data Teams

March 24, 2023
Add A Comment

Comments are closed.

Playlist: How to Protect Critical Data
Chris Hughes1/6
  • 1
    How Brainstorming With Data-Driven Teams Can Expedite Cybersecurity OutcomesRobert Wood
  • 2
    How to Enforce Cybersecurity When Managing Third-Party DataWayne Sadin
  • 3
    Why Data Silos Create Cybersecurity Risks and How to Break Them DownRobert Wood
  • 4
    Why Cybersecurity Teams Should Centralize Their Data for Better Threat DetectionRobert Wood
  • 5
    From PII to Passwords: How CISOs Deploy Cybersecurity Tools to Protect Sensitive DataFrank Domizio
  • 6
    Cloud Data Strategy, Analytics, and GovernanceWayne Sadin
Recent Posts
  • How Technology Ecosystem Partners Advance Digital Transformation Projects
  • SAP Expands Big Advantage It Has Over Oracle, Salesforce, Workday
  • How Teradata’s Vantage Cloud Lake Helps Customers Reduce Cloud Spend
  • Why Context Matters When Cybersecurity Leaders Communicate With Data Teams
  • Securing Multi-Cloud Ecosystems

  • 3X a week
  • Analyst Videos, Articles & Playlists
  • Exclusive Digital Business Content
This field is for validation purposes and should be left unchanged.
Most Popular Guidebooks

Securing Multi-Cloud Ecosystems

March 24, 2023

Securing Software-as-a-Service Applications

March 1, 2023

Retail Innovation With AI, Data, and Cybersecurity

March 1, 2023

Cloud Data Strategy, Analytics, and Governance

February 27, 2023

Advertisement
Acceleration Economy
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Advertising Opportunities
© 2023 Acceleration Economy.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?

Connect with

Login with Google Login with Windowslive

Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.