PRO+ Premium Content/E-Handbooks

Thank you for joining!
Access your Pro+ Content below.
February 2016

Lessons and next steps in continuous security monitoring

Sponsored by

Network visibility is both crucial for enterprise security and difficult to achieve. Organizations have implemented various technologies to allow for continuous security monitoring (CSM), and the U.S. government has also, in recent years, launched its own effort. This three-part guide looks in-depth at the federal effort known as Continuous Diagnostics and Mitigation (CDM), which offers an excellent basis, our expert authors say, for an enterprise-level continuous monitoring strategy. But technological advances -- including the current hybrid cloud environment -- mean that security efforts cannot be static.

Continuous security monitoring is a must and information security professionals must keep abreast of government efforts, the threat landscape, and the available technologies and services available to defense enterprise systems and data. This guide reviews developments of the past few years in terms of CSM and CDM, and looks ahead to help InfoSec pros adapt and advance their security monitoring efforts.

About The Author

Brad Casey

Brad Casey holds an MS from the University of Texas at San ...Read More

Table Of Contents

  • How the Federal CDM program applies to enterprises
  • The challenges hybrid cloud brings to network visibility
  • Perfecting your continuous monitoring strategy in a hybrid era

More PRO+ Content

View All