Don't Become the Next Cautionary Tale: Top Breach Prevention Strategies.

Presented by

Panel of experts

About this talk

Businesses are now spending $170.4 billion on information security annually, according to research from Gartner. Despite this huge investment, IBM's annual security report found that the average cost due to a data breach rose from $3.86 million in 2020 to $4.24 million in 2021, the highest in 17 years. Headlines call out the latest victims, including some of the world's biggest corporations. But how can businesses protect themselves when employees are scattered, data is exploding, and devices are proliferating? In this expert panel, cybersecurity experts will discuss best practices for proactively protecting your organization from the most common threats, and what to do when a breach does occur. Join us to explore: -- Preventing breaches from external and internal threats -- Tools and techniques for detection and response -- How the speed of response to a breach can minimize its effects -- Adapting breach protection to hybrid work models -- How modern architectures such as IoT and edge affect a breach prevention strategy Panelists include: Jeroen Hekelaar, Manager, Solutions Engineering EMEA, SonicWall Carl Leonard, Cybersecurity Strategist, Proofpoint Sources: https://www.proofpoint.com/uk/resources/threat-reports/state-of-phish https://www.proofpoint.com/uk/resources/e-books/legacy-dlp-crumbles-in-the-cloud https://www.proofpoint.com/uk/resources/threat-reports/state-of-phish https://www.proofpoint.com/us/resources/analyst-reports/gartner-market-guide-insider-risk-management https://www.sonicwall.com/2022-cyber-threat-report/ https://www.proofpoint.com/uk/resources/white-papers/voice-of-the-ciso-report

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (5)
Subscribers (394)
At Proofpoint, we give organisations the power to: -Protect people from the advanced attacks that target them (via email, mobile apps, and social media) -Protect the information people create (from advanced attacks and compliance violations), and -Equip people to respond quickly when things go wrong Our webinars are usually informative panel-style discussions targeted to the security professional.