Proactive Monitoring & Logging
Is an attacker lurking inside your network? Have your cloud accounts been accessed without your knowledge? Cybercriminals routinely hack systems and then lurk for weeks or months, monitoring conversations, siphoning off valuable data, and eventually installing ransomware. Even trusted tools, such as the Kaseya remote management system or SolarWinds software, can be used against you.
Proper monitoring and logging can help you to detect these intrusions early on—or even prevent them from happening in the first place. In this webinar, we’ll discuss:
- Tips for detecting incidents early
- Fundamental components of effective logging and monitoring
- Techniquest for detecting supply-chain attacks, such as Kaseya, SolarWinds and others
- Critical elements of evidence preservation
- Cost-effective monitoring options
- Tools and techniques for centralized logging
- Cloud visibility
Join us and learn practical strategies that can help you reduce your risk and detect minor incidents before they become major catastrophes.
Director of Training and Response
Matt Durrin is the Director of Training and Response for LMG Security, a Black Hat instructor, and the co-author of the upcoming book, “Ransomware and Cyber Extortion”. A seasoned forensics professional, Matt specializes in incident response, ransomware cases, cryptojacking, and banking trojans. He regularly conducts cybersecurity webinars and seminars for hundreds of attendees in all sectors, including banking, retail, health care, government and more. Matt holds a Bachelor’s Degree in Computer Science from the University of Montana and previously worked as a “blue team” field technician/system administrator for over 10 years. His malware research has been featured on NBC Nightly News.