Who's Watching the Watchers?
The Impact of Change and Configuration Management on Security and Compliance
Duration: 60 Minutes
Most enterprises focus their security strategies – and their security monitoring practices – on minimizing the risks posed by end users, customers, and/or business partners. But such strategies may overlook one huge source of risk: the IT department itself. Every day, IT staffers make changes to systems access controls, firewall settings, router port configurations, and many other administrative tools that may impact the security and compliance posture of the organization.
How can enterprises be certain that these everyday changes don't leave their systems and data open to attack?
In this webcast, a top expert in security research and administration will discuss the common mistakes enterprises make in change and configuration management, and how to ensure that these mistakes don't lead to unexpected security compromises.