A few weeks ago, I attended some CISO breakfast meetings on the east coast as part of the CISO Breakfast Network.  There was a lot of discussion about best practices, challenges, war stories, etc. related to log management, SIEM, and incident handling.

One session I found to be very helpful was a presentation by Amy Mushahwar, one of the attorney’s from the law firm Reed Smith.  They’ve just posted a video of her session, and I wanted to share it here as I believe it has information that you may find relevant (or at least thought-provoking).  The blog post about this can be found on the Reed Smith blog, and here is a direct link to the video.


Categories , , , Risk-Based Security for Executives, , , IT Security and Data Protection,

Tags , , ,

SANS Endpoint Security Maturity Model
  • http://www.rgzlaw.com rgzlaw.com

    I attended few CISO breakfast conclaves on the east slide as division of the CISO Breakfast Maze. There was a multiple of colloquy about prime drills, protests, fight stories, etc. kin to billet guidance, SIEM, plus occasion handling.

Dwayne Melancon

Dwayne Melancon has contributed 141 posts to The State of Security.

View all posts by Dwayne Melancon >