In this lesson, learn how to organize an application log management program for the tasks in a multi-regulation environment while avoiding duplication of effort.
About the author:
Diana Kelley is Diana Kelley is a partner with consulting firm SecurityCurve.
In this part:
Video: Log management strategies that work
"Almost all applications keep logs, but managing those logs -- wading through the vast amounts of data they collect to find important bits of information -- can feel like an impossible task. In this video presentation, Diana Kelley of consultancy SecurityCurve gives expert advice on how to tune log management tools and policies so they pick up on only the necessary events. Key concepts include: - Choosing the log management product that best matches your organization's needs - Understanding log management as a component of compliance - Tuning log management tools to pick up on only the necessary data - Normalizing log management tools across time zones"
Diana Kelley and James McGovern discuss the need for an application event log management standard.
Quiz: Application and network log management program planning
Find out how much you've retained from the Application and log management program planning Security School lesson.
Podcast: Top Five Ways to Improve Log Management Maturity Models
Although the concept has been around for a long time, there are still steps organizations can take to improve and streamline their application log management practices. In this podcast, Diana Kelley, Partner at consulting firm SecurityCurve, discusses the top five ways that enterprise organizations can improve their log management maturity models.