Chris Fry, security investigator for Cisco Systems Computer Security Incident Response Team (CSIRT), joined Cisco in 1997 as an IT analyst specializing in production services support. Fry spent four years as a network engineer within Cisco IT gaining enterprise network knowledge and a unique insight into monitoring production networks. In 2007, he presented Inside the Perimiter: 6 Steps to Improve Your Security Monitoring at the annual conference for the Forum for Incident Response and Security Teams (FIRST) in Seville, Spain, and at the Cisco Networkers conventions in Brisbane, Australia and Anaheim, California. Fry received a BA in Corporate Financial Analysis and an MS in Information and Communication Sciences from Ball State University.. He lives in Cary, North Carolina, with his wife, Laurie, and their two sons and daughter.
Webcast: Security Monitoring July 15, 2009
How well does your enterprise stand up against today's sophisticated security threats? In this webcast, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets...
"For those looking for an across-the-board overview, Security Monitoring provides a very practical and real-world detailed perspective of how to create a security monitoring program that can deal with todays exceedingly complex and sophisticated security threats."
--Ben Rothke, Security Management
"Examples offer specifics, not generalities, and provide all the keys to monitoring a network system in a pick highly recommended for any programmer's collection."
--James A. Cox, California Bookwatch: The Computer Shelf
"It isn't a text book, it isn't a light book to read at the airport and it isn't for those seeking an overview of network security. The book was never meant to be any of those things, it was written by techies to help other techies and in this respect, it fulfills its promise."
--Jonathan Newell, Pro Security Zone
"There are many good books that discuss the basics of systems administration. This is not one of those books. This book is much deeper and more specific and fills a niche that I think needed to be filled...I think this book belongs on the shelf of anyone who has any responsibility for the security of systems, whether that responsibility is ultimate or partial. There is a lot in here, and anyone working in the field is sure to benefit in some way from the information."
--Matthew Helmke, MatthewHelmke.net