Verified Document

Continuous Monitoring Plan Research Paper

¶ … Monitoring Plan Our organization is in the most advanced level: I will consider a wide variety of commercial and custom monitoring tools to handle the individual aspects of continuous monitoring. As the Chief Information Security Officer, I will purchase next generation firewalls, advanced intrusion prevention, security information management (SIM) and advanced log management systems to consolidate feeds into the alerting systems and monitoring dashboard (Fry & Martin, 2009). The SIM will be able to offer high-level threat by pulling information from asset information bases, financial systems of document classification systems. From the drawing, the organization will also combine monitoring capabilities on its own, by using open source, commercial and home-developed programs. All these continuous monitoring efforts will result in an improved situational awareness of users, systems, and activities. It will also foster a better awareness of attacks being attempted on the networks regardless of their best pro-active efforts.

I will integrate the security systems of the organization for continuous...

As the head of security, my collaboration with the operations team will be helpful in identifying the detective and proactive security data sets valuable to our monitoring efforts. The most time consuming part in integrating this network-monitoring piece will be the business logic. I will choose a vendor for analyzing data and data modeling to assist in the business logic development and integration (Broad, 2013). However, the IT staff will still need to customize these risk priorities and standard alerts based on our unique business needs. I will seek identify and understand the uses of the systems by working with various engineers and business units.
I will integrate all organization's reporting systems through the log management ground for correlation and normalization instead of having them exist as individual silos. Then, I will integrate the results into our situational awareness dashboard for full reporting and analysis. By heavily leveraging policies and by using self-developed policies within our management systems and commercial monitoring, I will integrate real time alerts from the…

Sources used in this document:
References

Broad, J. (2013). Risk management framework: A lab-based approach to securing information systems. Amsterdam: Syngress, an imprint of Elsevier.

Fry, C. & Martin, N. (2009). Security Monitoring. Sebastopol, Calif: O'Reilly Media, Inc., 2009. Internet resource.
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now