Reduce Security and Compliance Gaps with Continuous Security Monitoring

November 7, 2013 2:00pm EST

Organizations are moving from “Periodic” scanning to “Continuous Monitoring” to protect their information assets from advanced threats and exposure from new technologies such as mobile and virtual systems.  But, don’t assume that Continuous Monitoring just means more frequent scanning.

Join Mike Rothman, President of Securosis, and Jack Daniel, Tenable Product Manager, as they discuss how to choose the right technology and focus on the key vulnerability management processes to create a proactive risk-based security and compliance management program.

This webcast focuses on three specific use cases driving Continuous Security Monitoring:

  • Attacker use case focuses on identifying potential attacks and/or compromise of systems.
  •  Change control use case is an operations-centric view in monitoring for changes indicative of malicious activity.
  • Compliance use case is based on effectively implementing the checkbox requirements without compromising on security.

Find out how to choose the best solution that addresses these use cases to meet your security and compliance needs.

·        Attacker use case focuses on identifying potential attacks and/or compromise of systems

·        Change control use case is an operations-centric view in monitoring for changes indicative of malicious activity.

Compliance use case is based on effectively implementing the checkbox requirements without compromising on security
Speakers: 
Mike Rothman, President, Securosis
Jack Daniel, Technical Product Manager, Tenable Network Security

Download Webcast