How to Survive an IT Audit and Thrive Off It!

About this webinar

Recorded: May 16, 2017

Compliance standards and regulations are complex and they tell you everything about multiple requirements, but nothing about how to fulfill them. In these conditions, how does one survive an IT audit?

In this webinar, you’ll learn about top control processes that should be taken care of as matters of best practice or as core components of any IT compliance. These areas would probably be the most scrutinized by an auditor and will require evidence that supports the establishment and effectiveness of enabled policies and procedures.

Hosted by
Adam Stetson,
Systems Engineer

Hiding in Plain Sight: How Attackers Move through the Network Undetected

Once attackers have breached the perimeter, they often lurk in the network for months, looking for valuable data to steal. To stay hidden, they try to make their actions blend in with normal traffic.

By the end of this session, you will know:

·         What techniques attackers use to traverse the network without raising alarms

·         What native Microsoft tools can help you spot covert attacks

·         How you can identify the hiding attacks by using Netwrix Auditor functionality

24
April
2pm EDT
24 April, 2pm EDT
Register Now