An organization has a requirement to ensure they are meeting industry best practices for securing their IT environment. Which strategy is appropriate for this organization?
An organization would like to implement a solution that will correlate and analyze security log data to help them identify threats. Which strategy is appropriate for this organization?