Firewall Log Analysis – A Key Element of Cyber Security13/10/2020
KPMG Tauranga Office | 247 Cameron Road - Level 2, Tauranga, Bay of Plenty
|12:00-12:15||Arrivals & Networking|
|12:15-12:30||Welcome and Cyber Security News Update, Jon Edney [CISSP, CEH]|
|12:30-13:30||Firewall Log Analysis – A Key Element of Cyber Security, Win Amann, Cyber Security Engineer/Consultant, Tauranga|
In this presentation we will see how firewall logs provide a wealth of information that can be used to defend against cyber attacks. Through the demonstration of a real life example we will find ways to pinpoint suspicious/malicious traffic that will help to adjust firewall rules, find unsafe behaviour of employees, and create new/missing security policies.
Win Amann is a cybersecurity consultant and a Certified Ethical Hacker (CEH) with 20+ years of experience in different fields of IT (network administration, programming). Win’s focus is vulnerability assessment and implementing effective security controls that will reduce your attack surface significantly.