In this webcast, Joel Barnes, UK Senior Systems Engineer, will share how best to achieve trust after a data breach. He’ll cover crucial questions, such as: Which systems can be trusted? What is the extent of the compromise? How quickly can you attain situational awareness? He will also provide participants with an approach to restore trust in your critical systems after a data breach, following five steps:
1.Know what you have and prioritize by risk levels
2.Define what “good” looks like
3.Harvest system state information from your production systems
4.Perform a reference node variance analysis to identify compromised systems
5.Remove suspect systems from the environment and return to a trustworthy state
Join us for this informative webcast!