Application log management program planning

Integration of Networking and Security School

Application log management program planning

In this lesson, learn how to organize an application log management program for the tasks in a multi-regulation environment while avoiding duplication of effort.

Watch the video, listen to the podcast, read the tech tip then take the quiz to see how much you have learned. Passing the quiz earns you one CPE credit from (ISC)².

View our Security School Course Catalog to view more lessons eligible for CPE credits.

About the author:
Diana Kelley is Diana Kelley is a partner with consulting firm SecurityCurve.

In this part:

Video: Log management strategies that work

"Almost all applications keep logs, but managing those logs -- wading through the vast amounts of data they collect to find important bits of information -- can feel like an impossible task. In this video presentation, Diana Kelley of consultancy SecurityCurve gives expert advice on how to tune log management tools and policies so they pick up on only the necessary events. Key concepts include: - Choosing the log management product that best matches your organization's needs - Understanding log management as a component of compliance - Tuning log management tools to pick up on only the necessary data - Normalizing log management tools across time zones"

Q&A: Application event log management: The final frontier?

Diana Kelley and James McGovern discuss the need for an application event log management standard.

Quiz: Application and network log management program planning

Find out how much you've retained from the Application and log management program planning Security School lesson.

Take the quiz

Podcast: Top Five Ways to Improve Log Management Maturity Models

Although the concept has been around for a long time, there are still steps organizations can take to improve and streamline their application log management practices. In this podcast, Diana Kelley, Partner at consulting firm SecurityCurve, discusses the top five ways that enterprise organizations can improve their log management maturity models.