Abstract: Log collection and analysis is critical for an organization's ability to detect malicious activity quickly. Sometimes audit logs are the only evidence of a successful attack. Attackers know that many organizations keep audit logs for compliance purposes, but rarely analyze them. Due to poor log analysis processes, attackers sometimes control victim machines for months or years without anyone in the target organization knowing. In this episode, learn about using logs in incident management, analyzing what to log and the numerous factors to establish a successful audit log management process.
Sponsor: Blackpoint Cyber interview with Travis Brittain, Director of Product Enablement.
Logging & Compliance: https://blackpointcyber.com/logic/
Travis Brittain: https://www.linkedin.com/in/tbrittain/
Ryan Weeks: https://www.linkedin.com/in/ryanweeks/
Phyllis Lee: https://www.linkedin.com/in/phyllis-lee-21b58a1a4/
Wes Spencer: https://www.linkedin.com/in/wesspencer/