1-949-407-5125

Simple Practices

for Secure Configuration Management

One IT practice tops the list for both good cyber hygiene and regulatory compliance: secure configuration management, or system hardening. The toughest part about hardening your servers and other computers is not simply finding missing settings but establishing solid configurations in the first place and maintaining them over time.

Deep Dive

Identify weaknesses in current system configurations

Establish benchmark standards for a hardened posture

Apply those approved benchmark settings consistently

Promptly spot and correct drift into insecure configurations

Watch this session as we demonstrate just how easy Netwrix Change Tracker makes it for small IT teams to:

Being a native of Germany, he brings more than 25 years of delivering IT security expertise at a global scale. His work focuses on advancing cyber resilience as a sophisticated, new approach to tackle cyber-attacks faced by governments and organizations of all sizes for the handling of change and vulnerability as the two main issues to address in information security. He has published numerous articles in German and English about the need to address change and vulnerability to achieve cyber resilience, drawing on his experience and certifications as CISSP (ISC²) and CISM (ISACA). 

VP of Security Research

at Netwrix Corporation

Dirk Schrader

Webinar presenter:

© 2022 Netwrix Corporation

Privacy Policy | EU Privacy Policy | EULA

6160 Warren Parkway, Suite 100 Frisco, TX 75034 | Phone: 1-949-407-5125 | Toll-free: 888-638-9749

© 2022 Netwrix Corporation

Privacy Policy | EU Privacy Policy | EULA

6160 Warren Parkway, Suite 100 Frisco, TX 75034

Phone: 1-949-407-5125 | Toll-free: 888-638-9749

1-949-407-5125

Simple Practices

for Secure Configuration Management

One IT practice tops the list for both good cyber hygiene and regulatory compliance: secure configuration management, or system hardening. The toughest part about hardening your servers and other computers is not simply finding missing settings but establishing solid configurations in the first place and maintaining them over time.

Deep Dive

Watch this session as we demonstrate just how easy Netwrix Change Tracker makes it for small IT teams to:

Identify weaknesses in current system configurations

Establish benchmark standards for a hardened posture

Apply those approved benchmark settings consistently

Promptly spot and correct drift into insecure configurations

Being a native of Germany, he brings more than 25 years of delivering IT security expertise at a global scale. His work focuses on advancing cyber resilience as a sophisticated, new approach to tackle cyber-attacks faced by governments and organizations of all sizes for the handling of change and vulnerability as the two main issues to address in information security. He has published numerous articles in German and English about the need to address change and vulnerability to achieve cyber resilience, drawing on his experience and certifications as CISSP (ISC²) and CISM (ISACA). 

VP of Security Research

at Netwrix Corporation

Dirk Schrader

Webinar presenter:

© 2022 Netwrix Corporation

Privacy Policy | EU Privacy Policy | EULA

6160 Warren Parkway, Suite 100 Frisco, TX 75034 | Phone: 1-949-407-5125 | Toll-free: 888-638-9749

© 2022 Netwrix Corporation

Privacy Policy | EU Privacy Policy | EULA

6160 Warren Parkway, Suite 100 Frisco, TX 75034

Phone: 1-949-407-5125 | Toll-free: 888-638-9749