Discussion: Continuous Monitoring
Let's evaluate some technologies that can help with continuous monitoring. One example is Cyberscope which is an automated reporting tool for security reporting that receives recurring data feeds to assess the security posture of IT systems. Discuss the pros and cons of using cyberscope and what other suggestions you would have to improve continuous monitoring.
In the second week, discuss the major challenges in continuous monitoring of information systems security.