How to Survive an IT Audit and Thrive Off It!
About this webinar
Compliance standards and regulations are complex and they tell you everything about multiple requirements, but nothing about how to fulfill them. In these conditions, how does one survive an IT audit?
In this webinar, you’ll learn about top control processes that should be taken care of as matters of best practice or as core components of any IT compliance. These areas would probably be the most scrutinized by an auditor and will require evidence that supports the establishment and effectiveness of enabled policies and procedures.
Hiding in Plain Sight: How Attackers Move through the Network Undetected
Once attackers have breached the perimeter, they often lurk in the network for months, looking for valuable data to steal. To stay hidden, they try to make their actions blend in with normal traffic.
By the end of this session, you will know:
· What techniques attackers use to traverse the network without raising alarms
· What native Microsoft tools can help you spot covert attacks
· How you can identify the hiding attacks by using Netwrix Auditor functionality