Incidentally Informed – How to Achieve Cyber Resilience in Today’s Threat Landscape

The number of vendors providing some sort of technology to protect against or detect threats is growing daily. However, breaches still occur at an even more frequent rate than ever. This being the case, organizations have a duty to become more diligent in their ability to respond and potentially recover from these events. In this webinar, we will discuss not only why resiliency is more important than ever, but we talked through some things organizations can actually do to be more resilient.

In this episode of Incidentally Informed, we discuss this pressing topic with Steve Hindle, Senior Director, Global Security at SYKES, Stephan Gonzalez Information Security Officer at Achieva Credit Union and Dwayne Robinson Global Director, Incident Response at CyberClan

Our Panellists

Steve Hindle – Senior Director, Global Security at SYKES

Linkedin – https://www.linkedin.com/in/stitch/

Stephan Gonzalez – Information Security Officer at Achieva Credit Union

Linkedin – https://www.linkedin.com/in/stephan-gonzalez-a118b71a/

Dwayne Robinson – Global Director, Incident Response

Linkedin – https://www.linkedin.com/in/dwayne-robinson-2019/

Please wait while flipbook is loading. For more related info, FAQs and issues please refer to DearFlip WordPress Flipbook Plugin Help documentation.

Knowledge Base

Radius to Secure Your Corporate Network Using EEE 802.1x

Written by Morris Johnson By executing 802.1x on your network, you can greatly reduce the risk of your data and equipment being affected by a cyberattack. The IEEE 802.1x protocol

Read More +

Why a LAPS Solution Can Help to Further Secure Your Network and How to Install It

Written by Charlie Stubbs What is Microsoft LAPS? Local Administrator Password Solution (LAPS) acts as a password manager for Active Directory (AD). It ensures that all local administrators have unique

Read More +

The Importance of Change Management and Why it is Critical to Business Systems Security and Maintenance

Written by Tony McEvoy Any IT environment needs to be secure from internal and external threats even before, during and after a breach. As well as the physical components of

Read More +
icon-dark icon-light icon logo-light