YoVDO

Future Trends in IT Security - 5 Steps for Continuous Monitoring

Offered By: YouTube

Tags

Compliance Courses Asset Management Courses Continuous Monitoring Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore future trends in IT security through this insightful conference talk from BSides Rhode Island 2013. Delve into the importance of continuous monitoring, focusing on attack readiness and real-time identification of attack paths. Learn about daily patching strategies and long-term trending for improved security and compliance profiles. Discover the concept of "outcome-based" auditing and how to associate people with IT assets, holding managers responsible for system ownership. Understand the five steps for continuous monitoring and the SANS Critical Controls. Gain valuable insights on creating a more effective security posture by defining desired outcomes and tracking deviations in real-time.

Syllabus

Intro
Scan Daily
Focus on Attack Readiness Must identify attack paths in real-time...
Fix Daily With patching data and long term trending... Organizations can track daily progress for more effective security and compliance profile
Grade Personally Associate people with IT assets
Hold Managers Responsible "Outcome based" auditing in real-time... Who owns what systems? Define desired security posture and track deviation against it Inform asset owners and admins in real-time when
Five Steps for Continuous Monitoring
SANS Critical Controls


Related Courses

Cyber Security in Manufacturing
University at Buffalo via Coursera
Microsoft Azure DevOps Engineer: Recommend and Design System Feedback Mechanisms
Pluralsight
Security Event Triage: Operationalizing Security Analysis
Pluralsight
Utilizing Zeek in an Enterprise Environment or for Distributed Operations
Pluralsight
Enterprise Security
Udacity