This document discusses strategies for managing the growing volume of security data. It identifies four key problems caused by the abundance of security data: collecting the right data, storing data accessibly, dealing with different data formats, and controlling data access. The document recommends creating a Security Data Acquisition Strategy to determine high-value data to collect and centralize. It also suggests using log management technology to make security data accessible across programs in different formats while limiting access to centralized data.