Monitoring and Logging: That’s Right, We’re Watching You

Logging and monitoring provides an indication of what unauthorized security-related activities have been attempted or performed on a company’s network or systems, and helps determine what requires follow-up investigation and/or remediation. But to what extent can this process be automated, and when is human analysis required? And when does necessary monitoring become invasive spying? This session will consider the privacy aspects of monitoring and logging – particularly on BYOD – and how to get the most out of this practice.


Photo of John Cobb

John Cobb

Senior Incident Response Consultant, NCC Group

Photo of Ian Glover

Ian Glover

President, CREST

Photo of Graham Thomson

Graham Thomson

CISO, Thinkmoney Ltd

What’s hot on Infosecurity Magazine?