What cyber threat are you most concerned about?
Insider threats – rogue admins37%
Encrypting my data39%
Deleting my backup copies13%
Resident malware5%
Data theft – data exfiltration5%
Other
212 PARTICIPANTS
2.7k views1 Comment
Sort by:
Content you might like
Digital transformation isn’t just about new tools—it’s about changing how teams work. Key lessons I’ve observed:
1. Start with process bottlenecks, not technology
2. Empower cross-functional teams
3. Measure outcomes, not outputs
What has been the most surprising lesson your teams have learned during a transformation?
Seeking input: Has anyone drafted an SOW for a cloud-based SIEM with setup, migration, and maintenance? I’m working on a FedRAMP-authorized SIEM SOW, migrating from on-prem Splunk, covering data, searches, alerts, dashboards, and models.
Scope includes Environment Setup:
Cloud provisioning, configuration, testing.
Connectors/Parsers: Custom data source integration.
Content Development: Rules, use cases, threat feeds.
Performance Tuning: Query/index optimization.
Runbooks: Operational procedures.
Also required: 24x7 support, maintenance, lifecycle and application management, role-based training, and documentation.
Must comply with NIST SP 800-53, CJIS, and FedRAMP Moderate+. Goal: Secure, scalable SIEM for rapid deployment. I may be missing elements, so suggestions are welcome. Please share redacted SOWs or tips if possible.
Do you have data that allows you to objectively measure your team’s effectiveness as well as any positive impacts? What data do you currently rely on?
What are you doing to help reduce the risks of Social Engineering at your business?
Educate more than once a year55%
Placing more tech/monitoring on endpoints70%
Using a punitive strategy for clicks42%
Disconnecting all the phones!11%
Other (Share below)
Social engineering