How to Overcome the Human Error in Cyber Security?

Logo
Presented by

Aseel Kayal (Malware Analyst @ Check Point Software) and Kai Vaksdal (Compliance Product Manager for Europe)

About this talk

In 2019 we witnessed a record number of data breaches with employees and client's information stolen in enormous quantities. More than 90% of UK data breaches were due to human error. And, according to Check Point’s Cyber Security Report in 2020: •>80% of companies had unused or expired rules •77% of corporates had not fully documented their firewall rules •75% of corporates had not implemented anti-spoofing measures Join Aseel Kayal, Malware Analyst at Check Point, and Kai Vaksdal, Compliance Product Manager for Europe on Wednesday 13th May at 10:00 am to learn how to manage the risk of human error and negligence, and how do you prevent mistakes and achieve compliance. About the speakers: Aseel Kayal, Malware Analyst at Check Point Aseel is a malware analyst at Check Point and a member of the Threat Intelligence Analysis team. She is a mother tongue speaker of Arabic, Hebrew and English, and has an avid knowledge of multiple programming languages. Aseel's research focuses on targeted attacks and APTs, and includes insights into multiple ransomware families. Kai Vaksdal, Compliance Product Manager for Europe at Check Point Kai has extensive knowledge of compliance, best practice, and good governance (including GDPR) and how this can be achieved. He has delivered policy and information management solutions primarily within the Banking, Insurance, Finance, and Public Sectors but also into other markets.
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (347)
Subscribers (52787)
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Check Point Infinity’s portfolio of solutions protects enterprises and public organizations from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other threats. Infinity comprises three core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacenters, all controlled by the industry’s most comprehensive, intuitive unified security management; Check Point Horizon, a prevention-first security operations suite. Check Point protects over 100,000 organizations of all sizes.