Free webinar

The role of SIEM in PCI DSS compliance

  • July 2 at 11 am BST
  • 45 Mins

Presented by

Sid, Product expert

Why attend this webinar?

Advanced cyberthreats and the rising number of credit card breaches have made PCI DSS compliance more important than ever before. Meeting the twelve requirements of PCI DSS involves filling the gaps in your existing security strategy by implementing security policies and deploying security solutions.

Requirement 10 of PCI DSS deals with tracking accesses to network resources, and 11.5 expects users to have a change detection mechanism in place, such as a file integrity monitoring (FIM) tool, to detect unauthorized modifications to critical files. A security information and event management (SIEM) solution can help meet these objectives, making SIEM a crucial component of any organization's PCI DSS compliance program. Attend our free webinar to learn more about requirements 10 and 11.5, and how a SIEM solution such as ManageEngine Log360 can help you meet these requirements.

Agenda

  • Understanding requirements 10 and 11.5 of PCI DSS
  • The importance of monitoring network logs
  • The log management process: collecting, reviewing, reporting, alerting, and secure archiving
  • ManageEngine Log360 features that help with PCI DSS compliance
  • 2Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.
  • 3Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.
  • 4Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.

Thanks!

Your e-book is on its way.

If you don't find it in your inbox within the next few minutes, check your spam folder.

Closed

Zoho Corporation Pvt. Ltd. All rights reserved.

Claim Your Spot Now