Artwork

Контент предоставлен Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cyber Security Consultant. Весь контент подкастов, включая эпизоды, графику и описания подкастов, загружается и предоставляется непосредственно компанией Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cyber Security Consultant или ее партнером по платформе подкастов. Если вы считаете, что кто-то использует вашу работу, защищенную авторским правом, без вашего разрешения, вы можете выполнить процедуру, описанную здесь https://ru.player.fm/legal.
Player FM - приложение для подкастов
Работайте офлайн с приложением Player FM !

RCR 141: Mastering Logging, Monitoring, and AI in Cybersecurity (CISSP Domain 7)

34:12
 
Поделиться
 

Manage episode 372110821 series 3464648
Контент предоставлен Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cyber Security Consultant. Весь контент подкастов, включая эпизоды, графику и описания подкастов, загружается и предоставляется непосредственно компанией Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cyber Security Consultant или ее партнером по платформе подкастов. Если вы считаете, что кто-то использует вашу работу, защищенную авторским правом, без вашего разрешения, вы можете выполнить процедуру, описанную здесь https://ru.player.fm/legal.

Are you ready to level up your understanding of logging and monitoring in the world of cybersecurity? Join us, your host Sean Gerber, as we take a deep dive into CISSP domain seven, exploring the ins and outs of logging, monitoring, and how they play a crucial part in keeping your system protected. Listen closely as we unravel the challenges of managing vast amounts of data, deploying and disposing of resources, and utilizing cryptographic resources for physical security.
Discover the different types of logs - system, application, and security logs - and how they can be used to detect incidents, operational problems, and policy violations. We discuss the importance of accurate date and time stamps and the role logs play in forensics analysis, compliance, and troubleshooting. Moreover, we tackle the challenges of data overload, false positives, and evading detection.
In this episode, we also discuss the exciting role of Artificial Intelligence (AI) and Machine Learning (ML) in the security world, and how they can be used to enhance protection. Learn best practices when dealing with logging and monitoring, such as encryption, regular monitoring, and backups. By the end of this episode, you'll be well-equipped with knowledge on logging and monitoring that will not only help you pass the CISSP exam but also vastly improve your cybersecurity strategy.

Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.

Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.

  continue reading

187 эпизодов

Artwork
iconПоделиться
 
Manage episode 372110821 series 3464648
Контент предоставлен Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cyber Security Consultant. Весь контент подкастов, включая эпизоды, графику и описания подкастов, загружается и предоставляется непосредственно компанией Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cyber Security Consultant или ее партнером по платформе подкастов. Если вы считаете, что кто-то использует вашу работу, защищенную авторским правом, без вашего разрешения, вы можете выполнить процедуру, описанную здесь https://ru.player.fm/legal.

Are you ready to level up your understanding of logging and monitoring in the world of cybersecurity? Join us, your host Sean Gerber, as we take a deep dive into CISSP domain seven, exploring the ins and outs of logging, monitoring, and how they play a crucial part in keeping your system protected. Listen closely as we unravel the challenges of managing vast amounts of data, deploying and disposing of resources, and utilizing cryptographic resources for physical security.
Discover the different types of logs - system, application, and security logs - and how they can be used to detect incidents, operational problems, and policy violations. We discuss the importance of accurate date and time stamps and the role logs play in forensics analysis, compliance, and troubleshooting. Moreover, we tackle the challenges of data overload, false positives, and evading detection.
In this episode, we also discuss the exciting role of Artificial Intelligence (AI) and Machine Learning (ML) in the security world, and how they can be used to enhance protection. Learn best practices when dealing with logging and monitoring, such as encryption, regular monitoring, and backups. By the end of this episode, you'll be well-equipped with knowledge on logging and monitoring that will not only help you pass the CISSP exam but also vastly improve your cybersecurity strategy.

Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.

Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.

  continue reading

187 эпизодов

Все серии

×
 
Loading …

Добро пожаловать в Player FM!

Player FM сканирует Интернет в поисках высококачественных подкастов, чтобы вы могли наслаждаться ими прямо сейчас. Это лучшее приложение для подкастов, которое работает на Android, iPhone и веб-странице. Зарегистрируйтесь, чтобы синхронизировать подписки на разных устройствах.

 

Краткое руководство

Слушайте это шоу, пока исследуете
Прослушать