Proactive Monitoring & Logging
Is an attacker lurking inside your network? Have your cloud accounts been accessed without your knowledge? Cybercriminals routinely hack systems and then lurk for weeks or months, monitoring conversations, siphoning off valuable data, and eventually installing ransomware. Even trusted tools, such as the Kaseya remote management system or SolarWinds software, can be used against you.
Proper monitoring and logging can help you to detect these intrusions early on—or even prevent them from happening in the first place. In this webinar, we’ll discuss:
- Tips for detecting incidents early
- Fundamental components of effective logging and monitoring
- Techniquest for detecting supply-chain attacks, such as Kaseya, SolarWinds and others
- Critical elements of evidence preservation
- Cost-effective monitoring options
- Tools and techniques for centralized logging
- Cloud visibility
Join us and learn practical strategies that can help you reduce your risk and detect minor incidents before they become major catastrophes.
Director of Training and Response
Matt Durrin is the Director of Training and Research at LMG Security and a Senior Consultant with the organization. He is an instructor at the international Black Hat USA conference, where he has taught classes on ransomware and data breaches. Matt has conducted cybersecurity seminars, tabletop exercises and classes for thousands of attendees in all sectors, including banking, retail, healthcare, government, and more. He is also the co-author of a new book, Ransomware and Cyber Extortion: Response and Prevention. A seasoned cybersecurity and IT professional, Matt specializes in ransomware response and research, as well as deployment of proactive cybersecurity solutions. Matt holds a bachelor’s degree in computer science from the University of Montana, and his malware research has been featured on NBC Nightly News.