Главная
Study mode:
on
1
Introduction
2
Goals
3
Inventory and Logging
4
Don't Forget Physical Security Devices
5
System Monitoring Server V1
6
Benefits of Tools
7
Central Syslog Server
8
Snort IDS
9
Request Tracker
10
Nagios Config Example
11
Server V1 Pitfalls
12
Additional Tools with Security Onion
13
ELSA Rules/Alerts
14
Pros of the Current Setup
15
Limitations of the Current Setup
16
Future Considerations
17
Conclusion
18
Questions?
19
References
Description:
Learn how to build an information security program from scratch in this 26-minute conference talk. Explore essential steps from initial goals and inventory to implementing logging, physical security, and system monitoring. Discover the benefits of various tools, including a central syslog server, Snort IDS, and Nagios. Examine the pros and cons of different setups, and gain insights into future considerations for expanding your infosec program. Ideal for those starting in cybersecurity or looking to enhance their existing security infrastructure.

Building an Infosec Program from Ground Zero - From the Coat Closet to the Data Center

Add to list