![Exploring Information Security Archive 1 artwork](https://is2-ssl.mzstatic.com/image/thumb/Podcasts113/v4/0a/e3/29/0ae329a6-824b-e791-64ac-b689c563d1e9/mza_1630514793302750726.jpg/100x100bb.jpg)
How to apply network security monitoring
Exploring Information Security Archive 1
English - December 21, 2015 01:39 - 30 minutes - 34.7 MBTechnology Education How To Homepage Download Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed
Chris (@chrissanders88) is the co-author, along with Jason Smith, of Applied Network Security Monitoring: Collection, Detection, and Analysis. I recently finished the book and found it a valuable book for those operating within a SOC or those looking to start network security monitoring. Chris and Jason walk through the basics of network security monitoring including low-cost tools, snort, and how to investigate incidents. I highly recommend the book for those wanting to learn more about network security monitoring. In this episode we discuss: What is network security monitoring; what is needed to implement it; steps on how it should be applied; how to tune; and much more.
In this most excellent edition of the Exploring Information Security, I talk with author Chris Sanders about how to apply network security monitoring to an organization.
Chris (@chrissanders88) is the co-author, along with Jason Smith, of Applied Network Security Monitoring: Collection, Detection, and Analysis. I recently finished the book and found it a valuable book for those operating within a SOC or those looking to start network security monitoring. Chris and Jason walk through the basics of network security monitoring including low-cost tools, snort, and how to investigate incidents. I highly recommend the book for those wanting to learn more about network security monitoring.
Before I get to what was discussed in the podcast, I want to make special mention of a cause Chris is very passionate about. The Rural Technology Fund, which strives to, "reduce the digital divide between rural and non-rural communities." The organization tries to get funding for kids in rural areas who might not have the resources available to explore technology fields. I love this idea and think it's a great idea, especially with all the talent shortage talk lately.
In this episode, we discuss:
What is network security monitoring (NSM)What is needed for implementing NSMSteps on how it should be applied.How to tune after everything is up and running.More Resources:
Chris Sanders' websiteRural Technology FundApplied Network Security Monitoring