![Cyber Ops Unmasked artwork](https://is5-ssl.mzstatic.com/image/thumb/Podcasts113/v4/12/f7/f6/12f7f667-cc60-cc27-2fd3-18b3a3f0a3e0/mza_5956281970079082675.jpg/100x100bb.jpg)
Cybersecurity Weekly - Season 1, Episode 21
Cyber Ops Unmasked
English - May 27, 2020 14:41 - 13 minutes - 10.8 MBBusiness Technology infosystems tennessee cybersecurity fredcobb informationtechnology Homepage Download Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed
Previous Episode: Cybersecurity Weekly - Season 1, Episode 20
Next Episode: Cybersecurity Weekly - Season 1, Episode 22
In this episode, Fred and Rob discuss how to collect, manage, and analyze audit logs that help a corporation detect, understand, and recover from a cyber-attack. The maintenance, monitoring, and analysis of audit logs is most impactful when a company first has taken an inventory of Hardware Assets and Software Assets, practices Continuous Vulnerability Management, has Controlled Use of Administrative Privileges, and has Secured Configuration of Hardware/Software (following the CIS Top 20 Cybersecurity Controls).