Skip to content ↓ | Skip to navigation ↓

Tripwire’s Chief Technology Officer, Dwayne Melancon, will be sharing how to achieve trust after a data breach in this increasingly relevant webcast. He’ll cover crucial questions, such as:

  • Which systems can be trusted?
  • What is the extent of the compromise?
  • How quickly can you attain situational awareness?

Webinar Details:

  • Date: February 12, 2014
  • Time: 10:00 AM PST/1:00 PM EST
  • Duration: One Hour

learn more and register

Dwayne will also provide participants with an approach to restore trust in your critical systems after a data breach, following five steps:

  • Know what you have and prioritize by risk levels
  • Define what “good” looks like
  • Harvest system state information from your production systems
  • Perform a reference node variance analysis to identify compromised systems
  • Remove suspect systems from the environment and return to a trustworthy state

Register today to join us for this informative webcast.

Also, for a good primer for the webcast, check out Melancon’s recent article Target and Restoring Trust After a Data Breach

Dozens of previously aired webcasts covering topics like Security Configuration Management, Compliance Automation and Achieving Continuous Monitoring are available for viewing HERE.

 

Resources:

picThe Executive’s Guide to the Top 20 Critical Security Controls

Tripwire has compiled an e-book, titled The Executive’s Guide to the Top 20 Critical Security Controls: Key Takeaways and Improvement Opportunities, which is available for download [registration form required].

 

picDefinitive Guide to Attack Surface Analytics

Also: Pre-register today for a complimentary hardcopy or e-copy of the forthcoming Definitive Guide™ to Attack Surface Analytics. You will also gain access to exclusive, unpublished content as it becomes available.

 

Title image courtesy of ShutterStock