Continuous security monitoring approaches take security monitoring to the next level. Instead of simply focusing on the periodic review of logs for unusual activity, they conduct this analysis in real time, and can even take action in response to suspicious events. In this video, learn about continuous security monitoring activities.
- [Instructor] Continuous security monitoring approaches…take security monitoring to the next level.…Instead of simply focusing on the periodic review of logs…for unusual activity,…they conduct this analysis in real time…and can even take action in response to suspicious events.…Here's a more formal definition of continuous monitoring…from NIST.…Information security continuous monitoring…is maintaining ongoing awareness of information security,…vulnerabilities, and threats to support…organizational risk management decisions.…
As with many other information security activities,…NIST provides a framework for developing…a continuous approach to security monitoring.…They begin with three core characteristics…of a continuous monitoring program.…They should map to an organization's risk tolerance.…You need to make sure…that the continuous monitoring activities you undertake…are appropriate for your environment.…Security is an ever changing field…and businesses evolve as needs change.…Continuous security monitoring programs…
Released
1/11/2018- Risk management actions
- Ongoing risk management
- Risk management frameworks
- Scanning for threats and vulnerabilities
- Advanced vulnerability scanning
- Monitoring log files
- Code review and code tests
- Test coverage analysis
Share this video
Embed this video
Video: Continuous security monitoring