Three Ways Auditing Can Solidify Your Security Strategy

About this webinar

Recorded: January 29, 2016

According to the Global State of Information Security Survey 2016, the number of security incidents has grown by 38% this year. Cybercriminals have been successful in creating new techniques and deceptive tactics that outpace security efforts. Under these conditions, what would be your approach to dealing with security threats?

Watch the recorded webcast and learn how auditing can help mitigate the risk of data breaches and solidify your security strategy overall. During the session, we will talk about:

  • Security breaches and data leaks in the news and in reality;
  • How auditing complements threat defense mechanisms;
  • What must be audited and why.
Hosted by
Jeff Melnick,
Systems Engineer

How to Survive IT Audit… and Thrive off It!

Compliance standards and regulations are complex and  tell you everything about various requirements, but nothing about how to fulfill them. So how does one survive an IT audit?

In this webinar, you’ll learn about top control processes that you need to take care of either as a matter of best practice or as core components of any IT compliance. These are the areas that would probably be the most scrutinized by an auditor and will require evidence that supports the establishment and effectiveness of enabled policies and procedures.

16
May
11am EST
16 May, 11am EST
Register for free now!