723 words, 2.7 minutes read. By Gerard Blokdyk

Security Information and Event Management 1 big thing: Produce reports identifying significant or suspicious security events to appropriate parties.

The big picture: Ensure you plan to enhance your IT offerings, mature the way you interact with your business partners, and transform the culture of your teams.

Why it matters: Develop experience triaging prioritized alerts using the corporate Security Information and Event Management (SIEM) system to determine if they are in fact legitimate alerts, your organization is false positive alerts, or require additional review.

How it works: Assure your workforce is responsible for ensuring the security and stability of your organizations information technology resources; participates in leading your organizations incident response team in the event of a technology emergency or breach in confidential information.

State of play: Analyze phishing and malware detections and reports, block identified IOCs internally and work with the external 3rd parties to report relevant IOCs in the context of the extended response procedures.

The backdrop: Verify that your operation acts as department liaison and provides advice and guidance to hiring managers and supervisors on staffing policies, procedures and applicable employment laws and regulations.

What they’re saying: “Make sure the Information Security Administrator is responsible for a broad range of tasks, including the day-to-day administration of information security tools and devices, as well as first-level and second-level support for security information and event management (SIEM)., Information Security Engineer

What to watch: Confirm that your operation is responsible for detection capabilities including log management SIEM, continuous monitoring network security monitoring, threat hunting, penetration testing, vulnerability scanning, web app scanning, data loss prevention, security operations center, threat intelligence.

Yes, but: Facilitate process engineering, risk remediation, and mitigation of operational risk in a high-velocity culture by collaborating to introduce technology, requirements, deliverables, gaps, and systems design.

On the flip side: Check that your process is involved in engineering and leading a broad range of security solutions including SIEM, SOAR, Vulnerability management, Security assessments, Firewalls, IPS/IDS, DLP, Endpoint security, Application security, public Clouds.

Meanwhile: Assess and modify procedures to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access, modification or destruction.

Under the hood: Interface so that your staff administrators and technicians, compliance officers, and other key stakeholders in order to build information security strategies and programs, develop and implement enterprise-level information security policies and standards, lead information security awareness activities, and identify and remediate information security issues.


Get the Security Information and Event Management Kanban: Top Security Information and Event Management Must Haves

Look inside the Security Information and Event Management Kanban:

Learn the Top Emerging Security Information and Event Management Risks HERE: store.theartofservice.com/Security-Information-and-Event-Management-critical-capabilities/


Top thinkers are using The Art of Service Kanbans, the Kanbans that are helping leaders stay ahead of what’s next.

This Kanban will help you plan your roadmap. The Security Information and Event Management Kanban enables leaders to shortlist hundreds of appropriate results, already prioritized.

Get Started:

Questions? Email us HERE


Get started: store.theartofservice.com/Security-Information-and-Event-Management-critical-capabilities/


Be smart: Apply engineering principles in various projects as Building Systems and Controls integration, development of controls standards and details, and commissioning of complex controls strategies.

The bottom line: Make sure the Information Security Analyst performs a broad range of complex technical and professional work functions to identify, investigate, analyze and remediate information security events.

What’s next: Make headway so that your team ensures all required (internal) customer information and supporting documentation are captured for new and existing (internal) customers who are going through a triggering event or material change by coordinating with Business Unit Relationship Managers.

ICYMI: Check that your workforce performs audit reviews of systems comprised of multiple operating system using security information and event management (SIEM) products to track multiple events including any signs of inappropriate or unusual activity, intrusion events, data transfers, etc.

Look inside the Security Information and Event Management Kanban:

Want to reuse this data? Purchase your license here:

One-time payment for perpetual commercial re-use

Questions? Email us HERE


Get started: store.theartofservice.com/Security-Information-and-Event-Management-critical-capabilities/


Trusted by: Siemens, Siemens Healthineers, Siemens Energy, Siemens Gamesa Renewable Energy, Washington Metropolitan Area Transit Authority, BAE Systems, QVine Corporation, Yakshna Solutions, Sev1Tech, USP (U.S. Pharmacopeial Convention), Strategic Resources, Inc (HQ), NeoSystems, GRSi, RightDirection Technology Solutions, Ad Hoc Company Website, Tidal Basin, Johns Hopkins Applied Physics Laboratory (APL), FHLBank San Francisco, Holman Automotive Group, Colgate-Palmolive, Zimmer Biomet, United Center, Red Hat Software, The State of New Hampshire, Arkose Labs, Hot Topic Inc., Planned Parenthood, Anthem, Deloitte, University of Vermont, Abbvie, UNITED PARCEL SERVICE, Homebridge Financial Services Inc, Leidos, AlixPartners, United Nations Development Programme (UNDP), Microsoft, NW Natural, VOLT Systems, Tivity Health, Inc., Pinnacle Group, Ancestry, Amazon Dev Center U.S., Inc., Rivian Automotive, Faith Technologies Inc., Halock Security Labs, Nebraska Methodist Health System, IBM, Certilytics, Environmental Defense Fund, General Dynamics Information Technology, MetLife, City of Bellingham, P-11 SECURITY, Dollar Tree, Avant, State of Washington Auditor’s Office, Santander US, Research Innovations Inc, Carpe Data, Global Payments, MindPoint Group, LLC, Zebra Technologies, Hayden AI Technologies, Scientific Games, Bessemer Trust Company, AIG, First American, Intel, Booz Allen Hamilton, Capital One – US, Cincinnati/Northern Kentucky International Airport, Resilience, KPMG, Henry Ford Health System, MidAmerican Energy, RenPSG, Peer Solutions Group, Splunk, Belden Inc., Radford University, ActioNet, Eastern Research Group, Inc., Omega, General Dynamics Electric Boat, Sigma Defense Systems, Amazon Data Services, Inc., Zenetex LLC, Lakeland Bank, Atlantic Health System, LPL Financial, Wabash Valley Power Alliance, Redstone Federal Credit Union, Bering Straits Native Corporation