Description
SIEM and Log Management are software tools that allow an IT team to monitor the company’s security posture using log files, detect and respond to risk indicators, and conduct forensic data analysis and investigations into network events and possible attacks. This session covers the basic use case of these important tools.
This course is a part of IT Audit Bytes series. The other Segments of this series are:
- IT Audit Bytes – Access Control
- IT Audit Bytes – Backup and Recovery
- IT Audit Bytes – Change Management
- IT Audit Bytes – Cybersecurity
- IT Audit Bytes – Data Loss Prevention
- IT Audit Bytes – Disaster Recovery and BCP
- IT Audit Bytes – IT Control Frameworks
- IT Audit Bytes – Job Monitoring
- IT Audit Bytes – Logging and SEIM
- IT Audit Bytes – Network Security and Detection
- IT Audit Bytes – Password Management
- IT Audit Bytes – Physical Security
- IT Audit Bytes – Provisioning and Deprovisioning
- IT Audit Bytes – SDLC Controls
- IT Audit Bytes – Security Awareness Training
- IT Audit Bytes – Separation of Duties Controls
- IT Audit Bytes – SOC Reports
- IT Audit Bytes – Strategy and Governance
- IT Audit Bytes – Third-Party IT Risk Management (TPRM)