Data security is hard. There’s a lot of information that’s out there it’s hard to know what to implement and what to skip over. In addition, it seems like we hear a lot about the numbers behind the data breaches, but not the technical details of how the breach occurred. However, it’s the latter that’s of value to those in information technology and information security.
In the previous webinar we focused on the specific technical issues which led to the breaches. However, mistakes will happen, zero days will be found, and oversights will happen. Also, people will trust something they shouldn’t, leading to a compromised system and account. As a result, we should expect that being breached is inevitable. Most information security professionals start with the already breached mindset, meaning they are putting a lot of energy into detecting illicit activity. In this webinar we’ll look at advanced techniques to prevent data breaches but we’ll also discuss techniques to detect unusual activity.
Not all unusual activity is malicious. In fact, most activity is benign. The key is to detect what’s not normal and then report on it for further action. In order to do so, we’ll take a look at what SQL Server gives us to be able to detect activity and how to process it in order to note the differences. The things we’ll discuss:
Interested in additional SentryOne webinars? Check our webinar library.