What systems are in place to indicate a breach or data leakage? When will they trigger, through which channels, and who will be notified?
ITSP Magazine recently interviewed William Dixon, Associate Managing Director in our Cyber Risk practice, to gather his insights into both technical and strategical aspects of mature security programs. William spoke to Sean Martin, host of At The Edge, about the role of event logs in digital forensics and ways to spot an anomaly.