Filter By:

Type

Topic

Recent Blogs & Podcasts

Insights Portal

\ Security Operations 



March 29, 2018 | Insider Threats
By Mark Clancy, IANS Faculty

 Create an Effective Insider Threat Monitoring Program

Monitoring for insider threats is both important and complex, especially when privacy is also a concern. In this Ask-an-Expert live interaction, IANS Faculty Mark Clancy details the key steps to building an effective monitoring program, from deciding what and who to monitor, to ensuring employee privacy is protected. 

Read More »


March 20, 2018 | Managed Security Services
By Dave Shackleford, IANS Faculty

 Consider the Top MSSPs for Your SOC

How can you be sure the MSSP you choose for your SOC will be the right fit for your business and security needs? In this Ask-an-Expert written response, IANS Faculty Dave Shackleford details the main decision factors and lists the top MSSPs to consider, along with their strengths and weaknesses.

Read More »


March 8, 2018 | Metrics and Reporting
By Josh More, IANS Faculty

 Use Metrics to Communicate Risk Management’s Value

A successful metrics program helps tell security's story in a way that fosters business engagement and support, but what's the best way to get there? In this Ask-an-Expert written response, IANS Faculty Josh More discusses the difference between operational and strategic metrics, and offers tips for getting started using FAIR.

Read More »


February 13, 2018 | Security Analytics and Visualization
By John Strand, IANS Faculty,
     Aaron Turner, IANS Faculty

 Cut Through the AI/ML Hype

Vendors across the board are touting artificial intelligence and machine learning as the next big thing in security, but how practical is it for today's enterprises? In this Ask-an-Expert live interaction, IANS Faculty John Strand and Aaron Turner discuss the current state of the technology and offer practical ways to assess vendor offerings.

Read More »


February 6, 2018 | Security Information and Event Management (SIEM) and Log Management
By Justin Searle, IANS Faculty

 Strike the Right Balance When Logging Windows Events

Deciding what to log - and what not to log - is more of art than a science. In this Ask-an-Expert written response, IANS Faculty Justin Searle recommends starting with regulatory requirements and Microsoft's audit policy recommendations, as well as using the Suspect subscription to ensure  Windows event logs stay manageable and actionable.

Read More »


January 10, 2018 | Malware and Advanced Threats
By Aaron Turner, IANS Faculty

 Information Security Trends for 2018

In 2017, we saw some of our most valued controls undermined and witnessed security incidents impacting businesses around the world.  What will 2018 bring? In this report and webinar, IANS Faculty Aaron Turner examines the major trends in store for IT security professionals in the coming year. From the new incidents we need to prepare for to the investments we need to make to keep up with attackers' capabilities, we have our work cut out for us..

Read More »


January 3, 2018 | Insider Threats
By Mark Clancy, IANS Faculty

 Insider Threats: Know What to Watch For

Detecting and stopping insider threats requires a strong balance between people-oriented processes and technology-oriented solutions. In this Ask-an-Expert written response, IANS Faculty Mark Clancy details some common insider threat scenarios and offers tips for detecting them before they cause harm.

Read More »


December 27, 2017 | Security Analytics and Visualization
By Mark Clancy, IANS Faculty

 Anomaly Detection: A Market Landscape

Detecting anomalies across both users and networks requires a strong combination of network, endpoint detection and response (EDR), security and information event management (SIEM) capabilities and more. In this Ask-an-Expert written response, IANS Faculty Mark Clancy provides a rundown of market options, including their pros and cons.

Read More »


December 7, 2017 | Big Data
By Josh More, IANS Faculty

 Unified Data Management (UDM): A Primer

Before deploying UDM, it's important to understand what it is - and what it isn't. In this Ask-an-Expert written response, IANS Faculty Josh More provides an overview of the UDM market, including top features to look for and the capabilities of newer as-a-service offerings. He also explains why having a good level of data control is a prerequisite for UDM success.

Read More »


November 28, 2017 | Asset Discovery and Inventory
By Aaron Turner, IANS Faculty

 Create a Workable Asset Inventory

Creating an asset inventory for a large, multinational organization is a daunting task that is both difficult and expensive. In this Ask-an-Expert live interaction, IANS Faculty Aaron Turner details the process, from discovering assets, creating a service management database and determining asset ownership, to getting enough budget to pay for it all.

Read More »