Logging and monitoring provides an indication of what unauthorized security-related activities have been attempted or performed on a company’s network or systems, and helps determine what requires follow-up investigation and/or remediation. But to what extent can this process be automated, and when is human analysis required? And when does necessary monitoring become invasive spying? This session will consider the privacy aspects of monitoring and logging – particularly on BYOD – and how to get the most out of this practice.