Benjamin Butchko


Lessons Learned from the Project Trenches: Part 2 – PROJECT MANAGEMENT

What are the two biggest predictors of a security technology project success?  Performance expectations and requirements that are clear, and a project that is well-managed from start to finish.   If you don’t have the performance expectations correct, there is no way to measure if the project meets the needs of the stakeholders.  Expectation-setting, as well as managing the project itself is more art than science.  However, careful attention to details in advance along with stakeholder […]


Lessons Learned from the Project Trenches: Part 1 – EXPECTATIONS

What are the two biggest predictors of a security technology project success?  Performance expectations and requirements that are clear, and a project that is well-managed from start to finish.   If you don’t have the performance expectations correct, there is no way to measure if the project meets the needs of the stakeholders.  Expectation-setting and project management are more art than science.  However, careful attention to details in advance along with stakeholder engagement throughout the process will […]


Data analytics offer exciting new possibilities for security operations centers

I recently met with the CEOs and executive teams of some leading video and security operations center software providers and some interesting patterns developed.  These companies are serious about developing solutions that incorporate pure data analytics into their products.  This is exciting for the solution providers and offers great potential for companies.  Strong data analysis can provide predictive information to support proactive decision-making, improving security effectiveness, increasing the value delivered to the overall business, and […]


Does your Security Operations Center do what you need it to do?

No matter what combination of letters it goes by (SOC, ESOC, GSOC, AMC, NOC, MC, OC, PCC, SCC – the list seems to go on forever), most Security Operations Center have two common features: A bank of operator workstations, each with two to six monitors A wall of monitors displaying a continuous stream of information     But are they all really the same? Some are public relations showpieces. These commonly have glass walls, shiny […]


Smooth Out the Wrinkles in Your Security Program

All organizations deal with risk.  Without risk, there can be no positive return.  But when an organization falls on the negative side of the risk equation, the consequences can be devastating.   Prosperous organizations manage that risk with a healthy risk tolerance.  This tolerance varies from one group to the next, but there is an upper limit to what the organization considers “acceptable risk.”  Security managers and directors perform periodic risk assessment to determine the […]