Attackers, both internal and external, exploit privileged accounts in multiple ways. Attackers use privileged accounts to bypass controls, cover the tracks of an attack, improperly access confidential data, install malware, and make changes that impact system and data security.
Proper auditing of privileged account use can help uncover inappropriate privileged account use, and can also provide part of the check-and-balances required for compliance with IT security standards like PCI and HIPAA. Enterprise grade Unix and Linux distros provide similar auditing capabilities through Linux Audit, AIX Audit, Solaris Audit, BSD Security Event Auditing, etc.
In this on-demand webinar, Security Expert, Gary Patterson who will demonstrate:
- An introduction to audit and similar facilities
- Audit capabilities
- Analysis and reporting of audit information
<p>Gary Patterson is an Information Technology security consultant with experience with a variety of platforms including Cisco, Windows, Linux, AIX, and IBM i / iSeries / AS/400. Gary assists clients with a wide variety of IT security-related tasks - including IT security standards compliance, application/server/network security testing, security monitoring, source code vulnerability scanning, encryption implementations, and incident response. Gary is one of the founders and Vice President of Quorum Resources, Inc. (www.quorumresources.com), an IT services company.</p>