In this part:
In this presentation, our expert explores the key principals that are important for security practitioners to focus on to gain insight into their organization's security posture. You'll learn how to articulate a business-centric information security mission, establish network and host intelligence as the foundation for all of your security programs and build consistent processes to take action when anomalies are detected.
Use the network and host data at your disposal to create business-focused information security intelligence policies and strategies.
Nothing defines failure like hitting your head against the wall the same way over and over again. Sometimes security practitioners have to act boldly when a security product or procedure doesn't meet their requirements or expectations. In this podcast, you'll learn about key issues that help you determine when you need cut your losses for the sake of your organization's security posture.
Quiz: Security visibility: Honestly assessing security posture
Test your knowledge of Aaron Turner’s course on improving enterprise security visibility in this five-question quiz.