Ending Soon! Get an iPad Air with Smart Keyboard, Surface Go, or $300 Off thru Dec 11 with OnDemand or vLive Training!


To attend this webcast, login to your SANS Account or create your Account.

Continuous Monitoring: Ready for Prime Time or Still Just Hype

  • Friday, April 5th, 2013 at 1:00 PM EDT (17:00:00 UTC)
  • Tony Sager and John Pescatore
This webcast has been archived. You can view the webcast presentation and download the slides by logging into your SANS Portal Account or creating an Account. Click the Register Now button after you have logged in to view the Webcast.


  • FireEye
  • Forescout Technologies BV
  • Tripwire, Inc.

You can now attend the webcast using your mobile device!


Advanced targeted threats are continuing to evolve and at the same time trends like cloud and Bring Your Own Device are driving faster and faster change to IT systems. Occasional penetration tests, annual audits and quarterly vulnerability scans are no longer even close to sufficient to protect the business. Not only is more continuous monitoring necessary to maintain a due diligence level of security, it is increasingly a requirement of compliance regimes such as the Payment Card Industry, FISMA and others. However, continuous monitoring only increases security if the right things are monitored and if the monitoring is used to drive continuous improvement in security defenses. As the old saying goes; "You can't manage it if you can't measure it, but just measuring it doesn't manage it, either." Choosing the most effective security controls to monitor is key, and the Critical Security Controls initiative is proving to be a force multiplier for organizations looking to implement effective, efficient continuous management processes. Come hear SANS experts Tony Sager and John Pescatore detail the status and future of the Critical Security Controls and describe strategies and What Works in using the controls as the basis for a Continuous Monitoring program.

Speaker Bio

John Pescatore

Prior to joining Gartner, John was a Senior Consultant for two years with Trusted Information Systems, a Technology Manager with GTE for eleven years and a Security Engineer with the U.S. Secret Service for four years. John received his B.S., Electrical Engineering, from the University of Connecticut and is a NSA-certified Cryptologic Engineer.

Need Help? Visit our FAQ page or email webcast-support@sans.org.

Not able to attend a SANS webcast? All Webcasts are archived so you may view and listen at a time convenient to your schedule. View our webcast archive and access webcast recordings/PDF slides.