Future Trends in IT Security - 5 Steps for Continuous Monitoring
Offered By: YouTube
Course Description
Overview
Explore future trends in IT security through this insightful conference talk from BSides Rhode Island 2013. Delve into the importance of continuous monitoring, focusing on attack readiness and real-time identification of attack paths. Learn about daily patching strategies and long-term trending for improved security and compliance profiles. Discover the concept of "outcome-based" auditing and how to associate people with IT assets, holding managers responsible for system ownership. Understand the five steps for continuous monitoring and the SANS Critical Controls. Gain valuable insights on creating a more effective security posture by defining desired outcomes and tracking deviations in real-time.
Syllabus
Intro
Scan Daily
Focus on Attack Readiness Must identify attack paths in real-time...
Fix Daily With patching data and long term trending... Organizations can track daily progress for more effective security and compliance profile
Grade Personally Associate people with IT assets
Hold Managers Responsible "Outcome based" auditing in real-time... Who owns what systems? Define desired security posture and track deviation against it Inform asset owners and admins in real-time when
Five Steps for Continuous Monitoring
SANS Critical Controls
Related Courses
Demand management: Breaking down today’s commercial silosESSEC Business School via Coursera Introducción a la inversión bursátil
Universitat Politècnica de València via edX Fundamentals of Accounting Capstone
University of Illinois at Urbana-Champaign via Coursera Intro to Progressive Web Apps
Google via Udacity Accounting and Finance
Indian Institute of Management Bangalore via edX