Big Data Security Analytics , Governance & Risk Management , Next-Generation Technologies & Secure Development

The Road to Log Management Maturity

6 Critical Steps to Reach Security Maturity with Graylog's Mark Brooks
Mark Brooks, VP, Customer Solutions, Graylog

In today's disparate IT environment, there are gaping, business critical gaps in enterprise log management. Graylog's Mark Brooks discusses the Log Management Maturity Model and the six (6) critical steps to move from "no alignment" to "continuous improvement."

In this video interview with Information Security Media Group, Brooks, VP of Customer Solutions at Graylog, discusses:

  • What are the biggest security challenges today?
  • How to assess one's log management maturity;
  • How progressing through the model helps companies better monitor their security posture.

Brooks began his Customer Success journey installing and troubleshooting Windows 95. His relentless focus on solving problems provides unparalleled leadership for enterprise IT solutions.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.