Effective Incident Response Through User Activity Monitoring
With the cost of a data breach eclipsing the $4 million mark, organizations need to pay close attention to any suspected cyber incident, and the time they take to respond to it.
Join cyber security expert, Derek A. Smith (CISSP) and Nick Cavalancia from Techvangelism as they discuss:
- Correctly identifying an actual “incident” from background “noise.”
- Analyzing relevant incident data to determine cause and what the intention of the actor/s.
- Identifying what was compromised in the system, the network, and the digital assets.
- General recommendations for Incident Response.
- How Veriato helps companies with Incident Response.