Combating Malware:
Detect Configuration Changes
Before It’s Too Late
Webinar On Demand
The average time to detect a data breach is 207 days, according to the Cost of a Data Breach Report 2022 by IBM. When adversaries compromise your network, typically they don’t start acting right away; they keep a low profile
to look around and identify the best ways to compromise your network. This malicious activity often includes making changes to system configuration files — changes that can be detected by file integrity monitoring (FIM).
Of course, legitimate activity like patching can also result in configuration changes, so to avoid alert fatigue, you need a FIM solution that can distinguish between planned and unplanned changes.
Watch this webinar to discover how to:
Minimise your attack surface area
by establishing and maintaining secure configurations
Spot early signs of cyber threats
by analysing unexpected configuration changes
Ensure compliance
by implementing CIS controls and benchmarks
Dirk Schrader
VP of Security Research
Field CISO EMEA at Netwrix
Webinar Presenter:
Dirk has more than 25 years of experience delivering IT security expertise at a global scale. His work focuses on advancing cyber resilience, a modern approach that emphases vulnerability and change management to ensure business continuity in the face of cyberattacks, natural disasters and other adversity. A native of Germany who has earned CISSP (ISC²) and CISM (ISACA) certifications, he has published numerous articles in both German and English to help organizations of all sizes strengthen their cyber resilience.
© 2025 Netwrix Corporation
5 New Street Square, London EC4A 3TW | Phone: +44 (0) 203 588 3023
Corporate Headquarters: 6160 Warren Parkway, Suite 100 Frisco, TX, US 75034 | International: 1-949-407-5125
Combating Malware:
Detect Configuration Changes Before It’s Too Late
Webinar On Demand
The average time to detect a data breach is 207 days, according to the Cost of a Data Breach Report 2022 by IBM. When adversaries compromise your network, typically they don’t start acting right away; they keep a low profile to look around and identify the best ways to compromise your network. This malicious activity often includes making changes to system configuration files — changes that can be detected by file integrity monitoring (FIM). Of course, legitimate activity like patching can also result in configuration changes, so to avoid alert fatigue, you need a FIM solution that can distinguish between planned and unplanned changes.
Watch this webinar to discover how to:
Minimise your attack surface area
by establishing and maintaining secure configurations
Spot early signs of cyber threats
by analysing unexpected configuration changes
Ensure compliance
by implementing CIS controls and benchmarks
Dirk Schrader
VP of Security Research
at NNT, Now part of Netwrix
Dirk has more than 25 years of experience delivering IT security expertise at a global scale. His work focuses on advancing cyber resilience, a modern approach that emphases vulnerability and change management to ensure business continuity in the face of cyberattacks, natural disasters and other adversity. A native of Germany who has earned CISSP (ISC²) and CISM (ISACA) certifications, he has published numerous articles in both German and English to help organizations of all sizes strengthen their cyber resilience.
Webinar Presenter: