About the online seminar
Maintaining a 100% secure state in cybersecurity is extremely challenging. Cybersecurity involves not only defensive measures. such as access control and malware intrusion prevention but also the need for continuous monitoring and preparedness.
Specifically:
The ability to detect signs of impending incidents is crucial.
Properly identifying the causes of incidents and implementing measures to prevent recurrence is essential for accountability and prevention.
Establishing and maintaining mechanisms based on people and rules, not solely relying on tools, is important.
These requirements underscore the importance of logging and setting up incident response as a minimum standard.
Highlight at the seminar
Date and Time
In this seminar, we will share the following information:
1. What logs should you acquire?
2. How do logs indicate abnormal signs?
3. What information needs to be organized if abnormalities are found?
4. Who should you consult with for response in case of abnormalities?
- Friday, October 27, 2023
- @10:30 – 12:00 PM.
- Via Zoom Webinar
*Sorry for the inconvenience, we cannot providing the archive video. Please attend the seminar at the specified time only.
Highlight at the seminar
Date and Time
In this seminar, we will share the following information:
1. What logs should you acquire?
2. How do logs indicate abnormal signs?
3. What information needs to be organized if abnormalities are found?
4. Who should you consult with for response in case of abnormalities?
- Friday, October 27, 2023
- @10:30 – 12:00 PM.
- Via Zoom Webinar
*Sorry for the inconvenience, we cannot providing the archive video. Please attend the seminar at the specified time only.
Why do you have to attend the seminar?
– Protect valuable assets (customer data, intellectual property, and financial information).
– Receive data for cybersecurity risk assessment.
– Comply with regulations.
– Learn strategies to enhance security effectiveness.
Lectures by
Mr. Yasunari Kumono (Mek Rit)
[ Director, CISSP, CISA, CISM, PCI-QSA holder ] BroadBand Security, Inc.
Recommend for following persons
1. Had experience hacked your company system or data breach, but could not search detail reason of problem.
2. need to follow PDPA, other security regulations and also required Audit, but still do not have good logging system and do not know enough knowledge to select better one for your company.
3. Want to prevent Internal fraud, but do not have any good idea.
Privilege for a person who attending this seminar only
- 30 min free consultation (presentation document will be delivered only apply this service)
- Introduce total log management system
Webinar organization services for businesses
This service can help businesses plan and promote webinars to create opportunities for sales, thought leadership, engagement, and training objectives.
Let's learn together with industry experts!
Education is the passport to the future, for tomorrow belongs to those who prepare for it today.