InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Mutually Assured Security - Securing yourself, Vendors and Customers like Amgen

Presented by

Mihai Molcuti, Director Cybersecurity Operations at Amgen & Todd Carroll, CISO & VP of Operations at CybelAngel

About this talk

We are all striving to implement the best security practices to protect our companies. Hackers are looking to target our organization’s external surface in hopes of getting access to and/or stealing sensitive data. We’ve asked Mihai Molcuti, Director, Cybersecurity Operations at Amgen, one of the world’s largest biotech companies in the world, to share his tips on how to protect your company from hackers, malware, and more. Amgen has 19,000 employees in 66 offices across 49 countries. Join this webinar to learn: The top vulnerabilities in a corporate network Suggested first steps in securing a corporate network How cybersecurity pros stay safe in our digital world Join us at 9 November, 11AM ET, to learn how to Secure Your Company like a Cybersecurity Pro
CybelAngel

CybelAngel

1993 subscribers37 talks
Data leaks are inevitable. Damage is optional.
CybelAngel protects its customers with External Attack Surface Management (EASM) solutions that are powered by the most comprehensive external asset discovery and threat detection technologies available. Built upon close to a decade of machine learning, our advanced platform scans the entirety of the internet every 24 hours to uncover unknown assets and shadow IT, cloud services, connected devices, fraudulent domains and exposed credentials — the sources attackers use to access confidential data, launch phishing campaigns or initiate destructive ransomware attacks. CybelAngel's combination of machine learning and expert human analysis provides deep visibility into the most critical threats, long before they’re exploited.
Related topics