Business And Technology In Tennessee With Josh Davis
Cybersecurity Weekly - Season 1, Episode 21
- Autor: Vários
- Narrador: Vários
- Editor: Podcast
- Duración: 0:13:52
- Mas informaciones
Informações:
Sinopsis
In this episode, Fred and Rob discuss how to collect, manage, and analyze audit logs that help a corporation detect, understand, and recover from a cyber-attack. The maintenance, monitoring, and analysis of audit logs is most impactful when a company first has taken an inventory of Hardware Assets and Software Assets, practices Continuous Vulnerability Management, has Controlled Use of Administrative Privileges, and has Secured Configuration of Hardware/Software (following the CIS Top 20 Cybersecurity Controls).