23 August, 2018
What systems are in place to indicate a breach or data leakage? When will they trigger, through which channels, and who will be notified?
ITSP Magazine recently interviewed William Dixon, Associate Managing Director in our Cyber Risk practice, to gather his insights into both technical and strategical aspects of mature security programs.
William spoke to Sean Martin, host of At The Edge, about the role of event logs in digital forensics and ways to spot an anomaly.
For the full article, please click here.
For further information, please contact:
Paul Jackson, Managing Director, Asia-Pacific Cyber Security and Investigations Practice Leader, Kroll Associates (Asia)
paul.jackson@kroll.com