How To Protect Your JD Edwards System from Cyberattacks
Registration for Webcast
How To Protect Your JD Edwards System from Cyberattacks
On-Demand
During this session learn how to protect your JD Edwards system from cyberattacks.
Topics covered will include:
- A ransomware attack case walk through
- Protecting your perimeter
- Locking down ports
- Use of intrusion detection/prevention
- End point protection tools
- What to do if you determine you have been hit
- Create an incident response manual & template