The FBI calls and notifies you of a payment card breach, and every compromised card is linked to a transaction with your organization. Quickly: Who stole the data? How did they get access?
Register for this session to participate in a mock payment card breach investigation using Quest Software's IT Security Search. Join Quest (formerly Dell Software) security experts as they show you how to crack the mysteries of your Microsoft Environment:
Reduce security risks;
Maintain policy compliance and
adhere to regulations with solutions that assess, audit, alert, remediate and help organizations manage their Microsoft environments.
Security leaders know what they need. But they also recognize the cold truth: Organizations lack the visibility, forensic analysis, and preventive controls needed to meet compliance and internal security policies and compliance regulations. And if not properly managed, misuse of sensitive data, failed audits or security breaches can occur.
So, what happens when a breach does occur? What are the immediate steps to take to determine who stole the data and how they accessed it?
Participate in this mock breach investigation and see:
The processes and tools necessary for such an inquiry;
How to analyze the results;
What to do with the results to complete the investigation and plug any open security holes.
Hymer is an avid computer expert with more than 27 years in the IT industry. He has a varied background and has worked in IT for power, retail, healthcare, insurance and financial organizations. Over his 16 years at Quest (formerly Dell Software), he has traveled to customers around the globe, sharing his experience and helping them implement and use Dell products in a wide variety of environments. Hymer has also presented on numerous worldwide webinars and is a subject matter expert on the Windows Security Log and Active Directory Forest Recovery.