Data security is hard. There’s a lot of information that’s out there and it’s hard to know what to implement and what to skip over. In addition, it seems like we hear a lot about the numbers behind the data breaches, but not the technical details of how the breach occurred. However, it’s the latter that’s of value to those in information technology and information security.
In this webinar we will look at different data breaches which we know the technical details about. We’ll discuss how attackers got in and how they got out with the data. We’ll look at what vulnerabilities the attackers took advantage and how to shore up those weak points.
Not all of these vulnerabilities are in the database platform. Some are part of the authentication system, others are weaknesses in an OS or web server configuration, and still others are due to weaknesses in the application. In this webinar we’ll talk about:
Interested in additional SentryOne webinars? Check our webinar library.