InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Threatscape 2022: Cyber Attack Prevention

Presented by

Michelle Drolet | Kelvin Murray | Paul Prudhomme | James Johnson

About this talk

As organizations face several different challenges in 2022 and beyond, preparing for a cyber attack is as important as ever. Businesses face a myriad of cyber threats; from phishing to ransomware, it's imperative that your organization puts in place measures to protect your most important assets. Join top security leaders for an interactive discussion on how to better secure the enterprise in 2021 and learn more about: - Trends in cyber attacks and what's at risk - Prevention best practices - Solution recommendations for attack detection and response - Top threats on the horizon and what's at risk - How organisations can take the necessary steps to prepare for the unexpected and build business resilience Moderated by: Michelle Drolet, CEO, Towerwall Panelists include: Rapid7 Kelvin Murray, Snr. Threat Researcher, Carbonite + Webroot, OpenText Business Solutions Paul Prudhomme, Head of Threat Intelligence Advisory at IntSights, a Rapid7 Company James Johnson, Cloud & Data Security Specialist, ATG - EMEA, Proofpoint
Towerwall

Towerwall

2202 subscribers45 talks
Information Security
Towerwall is a woman-owned information security company offering a comprehensive suite of security services and solutions using best-of-breed tools and information security services. Our time-tested methodologies provide a consistent, repeatable, and measurable approach to information security; ranging from auditing and profiling to design and implementation. Towerwall’s 4E methodology, Evaluate Establish Educate Enforce, is time-tested, and provides a consistent, repeatable, and measurable approach to information security.
Related topics