How to Transform and Automate Security Operations