Proactive Monitoring & Logging

Is an attacker lurking inside your network? Have your cloud accounts been accessed without your knowledge? Cybercriminals routinely hack systems and then lurk for weeks or months, monitoring conversations, siphoning off valuable data, and eventually installing ransomware. Even trusted tools, such as the Kaseya remote management system or SolarWinds software, can be used against you.

Proper monitoring and logging can help you to detect these intrusions early on—or even prevent them from happening in the first place. In this webinar, we’ll discuss:

  • Tips for detecting incidents early
  • Fundamental components of effective logging and monitoring
  • Techniquest for detecting supply-chain attacks, such as Kaseya, SolarWinds and others
  • Critical elements of evidence preservation
  • Cost-effective monitoring options
  • Tools and techniques for centralized logging
  • Cloud visibility

Join us and learn practical strategies that can help you reduce your risk and detect minor incidents before they become major catastrophes.


Matt Durrin
LMG Security

Matt manages the incident response and R & D teams at LMG Security. He is an instructor at the international Black Hat USA conference, where he teaches classes on ransomware and data breaches. He regularly conducts cybersecurity webinars and seminars for hundreds of attendees in all sectors, including banking, retail, health care, government and more. A seasoned forensics professional, Matt specializes in incident response, ransomware cases, cryptojacking, and banking trojans. Matt holds a Bachelor’s Degree in Computer Science from the University of Montana and previously worked as a “blue team” field technician/system administrator for over 10 years. His malware research was recently featured on NBC Nightly News.