44 min

SPONSOR-Blumira's Nato Riley on Log Classification, Security Maturity‪,‬ BrakeSec Education Podcast

    • Tech News

 From Nato’s email:

Hi Bryan,
 
Discussing the challenges that come with not having good logging in place could be a great topic!  We could make it partly about how security maturity works, in the idea that security generally starts with awareness and visibility.
 
The topic sort of gets into the idea that knowing is half the battle, so logging can be transformative for helping a company properly secure themselves from online risks!
 
What do you think of this topic idea?
 
https://www.blumira.com/careers/



https://thenewstack.io/logging-and-monitoring-why-you-need-both/
 
https://prometheus.io/



https://www.sentinelone.com/blog/the-10-commandments-of-logging/
 
https://towardsdatascience.com/why-should-you-care-about-logging-442a195b80a1
 
https://www.g2.com/products/blumira-automated-detection-response/reviews#survey-response-4908309
 
(wouldn’t you know it… a couple additional google searches, and I find this -brbr)
https://www.executivegov.com/2021/08/omb-creates-maturity-framework-for-event-log-management/)
https://insidecybersecurity.com/sites/insidecybersecurity.com/files/documents/2021/may/cs2021_0089c.pdf
 
Logging maturity in the US gov (OMB policy doc): https://www.whitehouse.gov/wp-content/uploads/2021/08/M-21-31-Improving-the-Federal-Governments-Investigative-and-Remediation-Capabilities-Related-to-Cybersecurity-Incidents.pdf
 
Are there examples of devices that don’t give out logs? What if your vendor does not allow you to have logs? Can you create logs based on the activity of the device? What would that look like?



Types of logs:

Application logs
Network logs
Endpoint security logs
OS logs
IDS/IPS logs
Vuln scanner logs
 

 From Nato’s email:

Hi Bryan,
 
Discussing the challenges that come with not having good logging in place could be a great topic!  We could make it partly about how security maturity works, in the idea that security generally starts with awareness and visibility.
 
The topic sort of gets into the idea that knowing is half the battle, so logging can be transformative for helping a company properly secure themselves from online risks!
 
What do you think of this topic idea?
 
https://www.blumira.com/careers/



https://thenewstack.io/logging-and-monitoring-why-you-need-both/
 
https://prometheus.io/



https://www.sentinelone.com/blog/the-10-commandments-of-logging/
 
https://towardsdatascience.com/why-should-you-care-about-logging-442a195b80a1
 
https://www.g2.com/products/blumira-automated-detection-response/reviews#survey-response-4908309
 
(wouldn’t you know it… a couple additional google searches, and I find this -brbr)
https://www.executivegov.com/2021/08/omb-creates-maturity-framework-for-event-log-management/)
https://insidecybersecurity.com/sites/insidecybersecurity.com/files/documents/2021/may/cs2021_0089c.pdf
 
Logging maturity in the US gov (OMB policy doc): https://www.whitehouse.gov/wp-content/uploads/2021/08/M-21-31-Improving-the-Federal-Governments-Investigative-and-Remediation-Capabilities-Related-to-Cybersecurity-Incidents.pdf
 
Are there examples of devices that don’t give out logs? What if your vendor does not allow you to have logs? Can you create logs based on the activity of the device? What would that look like?



Types of logs:

Application logs
Network logs
Endpoint security logs
OS logs
IDS/IPS logs
Vuln scanner logs
 

44 min