Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Future Trends in IT Security - 5 Steps for Continuous Monitoring

via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore future trends in IT security through this insightful conference talk from BSides Rhode Island 2013. Delve into the importance of continuous monitoring, focusing on attack readiness and real-time identification of attack paths. Learn about daily patching strategies and long-term trending for improved security and compliance profiles. Discover the concept of "outcome-based" auditing and how to associate people with IT assets, holding managers responsible for system ownership. Understand the five steps for continuous monitoring and the SANS Critical Controls. Gain valuable insights on creating a more effective security posture by defining desired outcomes and tracking deviations in real-time.

Syllabus

Intro
Scan Daily
Focus on Attack Readiness Must identify attack paths in real-time...
Fix Daily With patching data and long term trending... Organizations can track daily progress for more effective security and compliance profile
Grade Personally Associate people with IT assets
Hold Managers Responsible "Outcome based" auditing in real-time... Who owns what systems? Define desired security posture and track deviation against it Inform asset owners and admins in real-time when
Five Steps for Continuous Monitoring
SANS Critical Controls

Reviews

Start your review of Future Trends in IT Security - 5 Steps for Continuous Monitoring

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.