All posts must be a minimum of 250 words. APA reference. 100% original work. no plagiarism.
Two more weeks have passed and your CISO is excited about implementing the new controls and solutions that you’ve recommended. Your detailed analysis of the operational environment and alignment of security solutions to the business mission and goals was spot on!
You have gained confidence in the CISO and board of directors, and they’ve identified additional funding that may be applied towards security. You have asked to implement Security Automation (read about it here: https://blog.rapid7.com/2017/05/18/security-automation/). Then review these additional readings as well:
“The Second Wave”: IS automation: https://www.isaca.org/resources/isaca-journal
Learn about Intrusion Detection and Prevention: Quick read on IDS/IPS systems: https://www.juniper.net/documentation/en_US/learn-about/LA_IntrusionDetectionandPrevention.pdf
1. Briefly list and explain two strengths of one of the technologies discussed in “The Second Wave” reading.
2. Explain how a properly configured IDS/IPS system can feed into your overall security plans.
3. Explain how the use of an IDS/IPS system can fit into the security automation process.