Intelligent CIO North America Issue 27 | Page 46

CIO OPINION
Recovery
About
As the CIO at 11:11 Systems , Jon Pratt ensures the continuous improvement of service quality , productivity and customer satisfaction .
Unplanned downtime can result in irrecoverable , long-term damage to the organization , customers and reputation . The impact of a disaster event can include revenue loss , customer churn and – in a worst-case scenario – the inability to continue business operations .
Additionally , he leads the technical operations teams , including customer support , implementation , managed and professional services , technical account management , customer success , infrastructure and data center operations .
Previously , he served as the company ’ s Senior Vice President of customer operations . Jon joined iland in 2020 ( prior to 11:11 ’ s acquisition of iland in January 2022 ) and brings a wealth of technical management experience including time spent in multiple leadership roles in infrastructure and security at organizations including TNT Crane and Rigging , US Legal Support and Healthhelp . Earlier in his career , Jon held numerous engineering roles at multiple managed service providers . Jon is a graduate of Arizona State University .
Alert fatigue is a real problem , assuming every element is even being monitored . Millions of daily notifications warn of potential security dangers and , while some can be discarded , others must be acted on immediately .
Managed SIEM solutions enable security professionals to log cyberattack events and to cross-analyze and aggregate the details into an actionable format . They enable CISOs to react quickly , and to provide value during the heat of the incident , at the very time it ’ s needed , identifying how the security breach happened and how to prevent it from doing more damage .
Response
Here , recovery requires proactive data backup and replication . Secure Cloud Backup delivers easy and cost-effective offsite data backup to achieve 3-2-1 protection best practices . The service provides a reliable safety net for a range of data loss events including malicious or accidental deletions , hardware failures and cybercrime .
Additionally , Disaster Recovery-as-a-Service ( DRaaS ) can combine the right people , processes and technology to prepare the business for disaster events and ensure a quick and successful recovery .
Improving defenses with Managed Security Services Providers ( MSSP )
Given the complexity , severity and 24 / 7 nature of the evolving threat landscape , the increasing requirement to meet compliance requirements , and the costs and limitations of in-house resources , the right MSSP can offer CISOs a great solution to address their need for affordable and trustworthy protection from cybercrime .
The global managed security services market is predicted to reach US $ 356.24 billion by 2025 , so it ’ s clear that more security professionals than ever are turning to MSSP solutions to bolster their defenses .
Not only do they enable access to a team of dedicated security experts and the very latest technologies , but they also deliver benefits such as cost savings , compliance and risk mitigation , scalability , and access to innovative technologies .
When we think about response , we are really talking about Managed Endpoint Detection and Response ( EDR ) providing next generation endpoint security that can quickly identify and stop abnormal behaviors . Cybercrime is becoming more sophisticated and attack vectors are everywhere , particularly since the move to remote working .
The end-user is the biggest vulnerability in any network environment and education is important . But the risk still exists , no matter how much training is given and it is critical to proactively protect the endpoint every single day .
These specialist support teams address all organizational security needs , with dedicated teams , state-of-the-art technology , facilities and processes that monitor and manage the simplest to the most complex of security incidents .
Many will provide organizations with help in developing a continuous improvement process to protect their business as the threat landscape continues to evolve . They also factor in business impact analysis and use prioritization methodology to identify and focus on resolving those that matter most to the organization . p
46 INTELLIGENTCIO NORTH AMERICA www . intelligentcio . com