InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Best Practices During a Cyber Pandemic | A Discussion with Motorola’s CISO

Presented by

Richard Rushing, CISO at Motorola Mobility | Eddie Doyle, Global Security Strategist at Check Point Software

About this talk

Experts in the security field have long predicted that a cyber pandemic could be the next global crisis. According to the ESI ThoughtLab survey of over 1,000 CISOs, cyber criminals and hackers are getting better at targeting and attacking companies. With cyber perpetrators using the COVID-19 pandemic to create havoc with vulnerable organizations, there's a question that should concern all security executives, "Is a cyber pandemic next?" Join Richard Rushing, CISO of Motorola Mobility and Edwin (Eddie) Doyle, Cyber Security Strategist from Check Point Software, as they uncover: • the key factors to withstand a major cyber attack • best practices to mitigate risks and loss • strategies to boost cost-benefit performance and ROI
Check Point Software

Check Point Software

58808 subscribers421 talks
The Leading Cyber Security Platform
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading AI-powered, cloud-delivered cyber security platform provider protecting over 100,000 organizations worldwide. Check Point leverages the power of AI everywhere to enhance cyber security efficiency and accuracy through its Infinity Platform, with industry-leading catch rates enabling proactive threat anticipation and smarter, faster response times. The comprehensive platform includes cloud-delivered technologies consisting of Check Point Harmony to secure the workspace, Check Point CloudGuard to secure the cloud, Check Point Quantum to secure the network, and Check Point Infinity Core Services for collaborative security operations and services.
Related topics