Deep Dive into IT Auditing

About this webinar

Recorded: July 28, 2016

Watch the recorded second session of the online course “Getting Started with IT Auditing,” and get up to speed quickly on how to start IT auditing and take advantage of it.

In this recording, we’ll dive deep into IT auditing and discuss the top critical changes to audit in your IT infrastructure, best practices, and key tips and tricks for using Netwrix Auditor. Also, we’ll demonstrate the product’s functionality and its core capabilities.

By the end of the course, you will learn how having extended visibility incorporated into your company’s security strategy can help you:

• Deter and detect insider threats more efficiently and prevent breaches;
• Investigate security incidents more quickly;
• Validate that security controls are working and policies are being followed;
• Gather and provide evidence for compliance;
• And even more!

Hosted by
Jeff Melnick,
Systems Engineer
Richard Muniz,
Industry Expert

Hiding in Plain Sight: How Attackers Move through the Network Undetected

Once attackers have breached the perimeter, they often lurk in the network for months, looking for valuable data to steal. To stay hidden, they try to make their actions blend in with normal traffic.

By the end of this session, you will know:

·         What techniques attackers use to traverse the network without raising alarms

·         What native Microsoft tools can help you spot covert attacks

·         How you can identify the hiding attacks by using Netwrix Auditor functionality

24
April
2pm EDT
24 April, 2pm EDT
Register Now