FOUR STEPS TO SECURITY AUTOMATION SUCCESS