The CyberCast

CIS Control 8 - Audit Log Management - sponsored by Blackpoint Cyber

February 12, 2022 Andrew Morgan
The CyberCast
CIS Control 8 - Audit Log Management - sponsored by Blackpoint Cyber
Show Notes

Abstract: Log collection and analysis is critical for an organization's ability to detect malicious activity quickly.  Sometimes audit logs are the only evidence of a successful attack.  Attackers know that many organizations keep audit logs for compliance purposes, but rarely analyze them.   Due to poor log analysis processes, attackers sometimes control victim machines for months or years without anyone in the target organization knowing.  In this episode, learn about using logs in incident management, analyzing what to log and the numerous factors to establish a successful audit log management process.

Sponsor: Blackpoint Cyber interview with Travis Brittain, Director of Product Enablement.
Logging & Compliance: https://blackpointcyber.com/logic/

Travis Brittain: https://www.linkedin.com/in/tbrittain/

Co-hosts:
Ryan Weeks: https://www.linkedin.com/in/ryanweeks/
Phyllis Lee: https://www.linkedin.com/in/phyllis-lee-21b58a1a4/
Wes Spencer: https://www.linkedin.com/in/wesspencer/