Cyber security log management and incident response

-Cyber Kill Chain- The pattern of attacking step by hacker

Ordinary action for incident response (Identify -> protect -> detect -> respond)

cybersecurity-it-review

About the online seminar

Maintaining a 100% secure state in cybersecurity is extremely challenging. Cybersecurity involves not only defensive measures. such as access control and malware intrusion prevention but also the need for continuous monitoring and preparedness.

Specifically:
The ability to detect signs of impending incidents is crucial.
Properly identifying the causes of incidents and implementing measures to prevent recurrence is essential for accountability and prevention.
Establishing and maintaining mechanisms based on people and rules, not solely relying on tools, is important.
These requirements underscore the importance of logging and setting up incident response as a minimum standard.

Highlight at the seminar

Date and Time

In this seminar, we will share the following information:
1. What logs should you acquire?
2. How do logs indicate abnormal signs?
3. What information needs to be organized if abnormalities are found?
4. Who should you consult with for response in case of abnormalities?

*Sorry for the inconvenience, we cannot providing the archive video. Please attend the seminar at the specified time only.

Highlight at the seminar

Date and Time

In this seminar, we will share the following information:
1. What logs should you acquire?
2. How do logs indicate abnormal signs?
3. What information needs to be organized if abnormalities are found?
4. Who should you consult with for response in case of abnormalities?

*Sorry for the inconvenience, we cannot providing the archive video. Please attend the seminar at the specified time only.

Why do you have to attend the seminar?

– Protect valuable assets (customer data, intellectual property, and financial information).

– Receive data for cybersecurity risk assessment.

– Comply with regulations.

– Learn strategies to enhance security effectiveness.

Organized by

orb-bbsec-it-review

ORB forensics branded by BBSec

Recommend for following persons

1. Had experience hacked your company system or data breach, but could not search detail reason of problem.
2. need to follow PDPA, other security regulations and also required Audit, but still do not have good logging system and do not know enough knowledge to select better one for your company.

3. Want to prevent Internal fraud, but do not have any good idea.

Fee

Privilege for a person who attending this seminar only

Webinar organization services for businesses

This service can help businesses plan and promote webinars to create opportunities for sales, thought leadership, engagement, and training objectives.

Let's learn together with industry experts!

Education is the passport to the future, for tomorrow belongs to those who prepare for it today.

Scroll to Top