Repeat after me, I will get breached. Most organizations realize this fact too late; usually after a third party informs them - months after the initial compromise. Treating security monitoring as a quarterly auditing process means most compromises will go undetected for weeks or months. The attacks are continuous, and the monitoring must match.
Modern threats require a paradigm shift in the way we perform our analysis and monitoring. This talk will help you face the problems and describe how to move your organization to a more defensible security architecture that enables continuous security monitoring.
You can download the Prezi in PDF format or view the Prezi directly by going to the following link:https://prezi.com/xukhuqulaqkf/continuous-monitoring-and-real-world-analysis/