Evaluate some technologies that can help with continuous monitoring. One example of many is Cyberscope, an automated reporting tool for security reporting that receives recurring data feeds to assess the security posture of IT systems. Discuss the pros and cons of using continuous monitoring tools and make other suggestions to improve continuous monitoring.
In the second week, discuss the major challenges in continuous monitoring of information systems security.
*will send 2 classmates after completion of discussion so you can respond!