Firewall Log Analysis – A Key Element of Cyber Security
13/10/2020
KPMG Tauranga Office | 247 Cameron Road - Level 2, Tauranga, Bay of Plenty
Agenda
12:00-12:15 | Arrivals & Networking |
12:15-12:30 | Welcome and Cyber Security News Update, Jon Edney [CISSP, CEH,CIPT] |
12:30-13:30 | Firewall Log Analysis – A Key Element of Cyber Security, Win Amann, Cyber Security Engineer/Consultant, Pro.Security |
13:30-13:45 | Networking |
Summary
In this presentation we will see how firewall logs provide a wealth of information that can be used to defend against cyber attacks. Through the demonstration of a real life example we will find ways to pinpoint suspicious/malicious traffic that will help to adjust firewall rules, find unsafe behaviour of employees, and create new/missing security policies.
Presenter Profile
Win Amann is a cybersecurity consultant and a Certified Ethical Hacker (CEH) with 20+ years of experience in different fields of IT (network administration, programming). Win’s focus is vulnerability assessment and implementing effective security controls that will reduce your attack surface significantly.