Тёмный

Effective Security Logging: What and How to Monitor for Security Issues 

TrustedSec
Подписаться 5 тыс.
Просмотров 433
50% 1

In today's digital landscape, understanding what to log and how to effectively monitor these logs is crucial for maintaining robust security defenses. Often, inadequate logging results in a deficiency of available telemetry, leading to gaps in detection.
During this webinar, attendees learned:
• Which logs are critical to ingest into your SIEM
• The importance of filtering and ingesting only necessary data
• Key aspects to focus on for tuning
• The risks of over-reliance on EDR endpoints or EDR tools
Join Megan Nilsen, the Attack Simulation and Detection and Tactical Awareness & Countermeasures (TAC) Practice Lead, and Carlos Perez, the Director of Security Intelligence as they delve into the essentials of security logging, providing a comprehensive guide on identifying critical events, setting up efficient logging mechanisms, and enhancing your overall security posture. Attendees gained practical insights and actionable steps to optimize their logging practices and strengthen their defenses against cyber threats.

Опубликовано:

 

8 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 4   
@jorisignoul5710
@jorisignoul5710 Месяц назад
Can you provide the minimum event ID list?
@Geeky-Boy
@Geeky-Boy Месяц назад
Amazing Can I contact you if I have some inquiries or consultations?
@TrustedSecTV
@TrustedSecTV Месяц назад
Yes! trustedsec.com/contact
@Geeky-Boy
@Geeky-Boy Месяц назад
@@TrustedSecTV perfect 🥰
Далее
Ask Me Anything: Proactive Threat Hunting
1:00:30
🛑 ты за кого?
00:11
Просмотров 92 тыс.
Cyber Threat Intelligence Masterclass - By Aroma Rose
1:42:20
you need this FREE CyberSecurity tool
32:06
Просмотров 1,2 млн
Cyber Security Project: Vulnerability Management
17:54
What is Endpoint Detection and Response (EDR)?
5:34
Просмотров 49 тыс.
EDR, MDR & XDR Explained
10:33
Просмотров 38 тыс.