Presentations | English
From hackers and malware, to disgruntled or careless employees, to outdated or otherwise vulnerable devices and operating systems, to mobile and public cloud computing, to third-party service providers, most companies are routinely exposed to security threats of varying severity in the normal course of conducting business. Given the ubiquitous, unavoidable nature of security risks, quick response time is essential to maintaining system security, and automated, continuous security monitoring is the key to quick threat detection and response. Security monitoring is the automated process of collecting and analysing indicators of potential security threats, then triaging these threats with appropriate action. It sometimes referred to as "security information monitoring (SIM)" or "security event monitoring (SEM)," involves collecting and analysing information to detect suspicious behaviour or unauthorised system changes on your network, defining which types of behaviour should trigger alerts, and taking action on alerts as needed. There are three primary areas or classifications of security controls. These include management security, operational security, and physical security controls. The presentation gives better understanding on the topic.
6.00
Lumens
PPTX (24 Slides)
Presentations | English