Challenge:
- Summit Utilities needed a unified platform to support real-time control monitoring across a complex and growing tech infrastructure.
- Little did the team know that an encryption gap was created by a missed step in a new process.
- Existing security tools had failed to surface the issue, leaving the organization vulnerable despite having policies in place.
Solution:
- Summit’s GRC Cybersecurity Analyst Jamie Brookes integrated Anecdotes across Summit’s tech stack with nine proprietary plug-ins.
- Using out-of-the-box and custom monitoring rules, Jamie quickly surfaced a security issue that none of the security tools had flagged.
- Anecdotes surfaced the issue immediately by consolidating GRC data to help trace the vulnerability to its root cause.
- Jamie now tracks compliance continuously and shares findings weekly. GRC data from Anecdotes informs remediation efforts and process updates.
"We wouldn’t have caught this issue without Anecdotes. Now we know where the problem is and how to fix it."
— Jamie Brookes, GRC Cybersecurity Analyst, Summit Utilities
The Results:
- Critical Gap Discovery: Anecdotes’ combination of out-of-the-box and configurable custom rules allowed Jamie to pinpoint a critical security gap immediately and use continuous monitoring to resolve it.
- Tangible Remediation: Weekly reports and clear audit trails enable security, infrastructure, and service desk teams to coordinate effectively on gap remediation.
- Rapid Ramp-up: Jamie says Anecdotes’ AI recommendations, helpful support articles, and responsive customer service team were key to helping her deliver value with Anecdotes right away.
“Anecdotes showed us exactly where our controls weren’t being enforced and gave us the data to drive change.”
— Aaron Baillio, Director of IT Security, Summit Utilities