Recorded: Detect an Unauthorized Change to an SIS Using Cyber Integrity

    (2 in 3 Series) Find out how operations personnel can receive alerts when an unauthorized configuration change occurs (in this case, an SIS) and how you can remediate the change and validate within an audit ready system.

Register to View the Recorded Event