Simple Practices
for Secure Configuration Management
One IT practice tops the list for both good cyber hygiene and regulatory compliance: secure configuration management, or system hardening. The toughest part about hardening your servers and other computers is not simply finding missing settings but establishing solid configurations in the first place and maintaining them over time.
Deep Dive
Identify weaknesses in current system configurations
Establish benchmark standards for a hardened posture
Apply those approved benchmark settings consistently
Promptly spot and correct drift into insecure configurations
Watch this session as we demonstrate just how easy Netwrix Change Tracker makes it for small IT teams to:
Being a native of Germany, he brings more than 25 years of delivering IT security expertise at a global scale. His work focuses on advancing cyber resilience as a sophisticated, new approach to tackle cyber-attacks faced by governments and organizations of all sizes for the handling of change and vulnerability as the two main issues to address in information security. He has published numerous articles in German and English about the need to address change and vulnerability to achieve cyber resilience, drawing on his experience and certifications as CISSP (ISC²) and CISM (ISACA).
VP of Security Research
at Netwrix Corporation
Dirk Schrader
Webinar presenter:
© 2024 Netwrix Corporation
6160 Warren Parkway, Suite 100 Frisco, TX 75034 | Phone: 1-949-407-5125 | Toll-free: 888-638-9749
Simple Practices
for Secure Configuration Management
One IT practice tops the list for both good cyber hygiene and regulatory compliance: secure configuration management, or system hardening. The toughest part about hardening your servers and other computers is not simply finding missing settings but establishing solid configurations in the first place and maintaining them over time.
Deep Dive
Watch this session as we demonstrate just how easy Netwrix Change Tracker makes it for small IT teams to:
Identify weaknesses in current system configurations
Establish benchmark standards for a hardened posture
Apply those approved benchmark settings consistently
Promptly spot and correct drift into insecure configurations
Being a native of Germany, he brings more than 25 years of delivering IT security expertise at a global scale. His work focuses on advancing cyber resilience as a sophisticated, new approach to tackle cyber-attacks faced by governments and organizations of all sizes for the handling of change and vulnerability as the two main issues to address in information security. He has published numerous articles in German and English about the need to address change and vulnerability to achieve cyber resilience, drawing on his experience and certifications as CISSP (ISC²) and CISM (ISACA).
VP of Security Research
at Netwrix Corporation
Dirk Schrader
Webinar presenter: