Tip

Weekly Security Planner: September

In an effort to help busy security managers, CISSP Shelley Bard's weekly column builds upon the concept of the perpetual calendar, offering a schedule of reminders for a proactive, strategic security plan. Here are the objectives Shelley prescribes for weeks 35 through 39.

Week 35: Incident response

    Requires Free Membership to View


Objective: Evaluate your incident response plan as needed.

Week 36: Ports -- Don't have an 'open house' sign out
Objective: Manage network ports as needed.

Week 37: Who's afraid of auditing?
Objective: Review audit logs at least weekly, preferably daily.

Week 38: Understanding Unix auditing and logs, part one
Objective: Audit Unix logs at least weekly, preferably daily.

Week 39:Understanding Unix auditing and logs, part two
Objective: Audit Unix logs at least weekly, preferably daily.


Weekly Security Planner Schedule
January
February
March
April
May
June
July
August
September
October
November
December

This was first published in December 2004

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.