Learn the data sources you should collect to understand security-related activities on your network.
Teams working to monitor network and workstation security need to know what data to monitor and what to prioritize.
Making a list of all possible specific logs that could be used for security monitoring requires an infinite amount of time.
However, when you understand how to best use each information type, you can identify and prioritize virtually any source.
In this webinar, we will provide a comprehensive list of information to collect and analyze, including:
We will then assist security professionals by ranking that information from most critical to least critical.
Join Mike Simon, CTO of CI Security, and SANS experts to get actionable take-aways to make your network monitoring routines more efficient, with added context about not just what to monitor, but why.