InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Customer Success Story: Ströer & Cyberint

Presented by

Benjamin Bachmann, Group CISO at Ströer & Daniel Pigeon, Sr. Product Marketing Manager at Cyberint

About this talk

Ströer, a leading German media company, significantly improved security posture with deployment of Cyberint, the leading provider of impactful intelligence. Join us for this webinar as B̳e̳n̳jamin Bachmann, Group CISO at Ströer, discusses the positive impact that working with Cyberint has had on Ströer’s cybersecurity program. Topics will include: • The current threat landscape & what’s top of mind for CISOs right now • Complexities in managing the security of many brands and companies • Challenges and cyber threats faced prior to engaging with Cyberint • Results and outcomes provided by the Cyberint platform Register now and join us for the recorded webinar on Tuesday, October 10th at 11am EST.
Cyberint, now a Check Point Company

Cyberint, now a Check Point Company

13568 subscribers41 talks
Impactful intelligence to help you detect & defeat cyber risks faster
Cyberint is now a Check Point Company. Its impactful intelligence solution combines cyber threat intelligence, external attack surface management, brand protection, and digital supply chain intelligence into a single, powerful solution. By leveraging autonomous discovery of all of an organization’s external-facing assets, coupled with open, deep & dark web intelligence, the solution enables cybersecurity teams to accelerate the detection and disruption of their most pressing cyber risks. Global customers, including Fortune 500 leaders across all major market verticals, rely on us to prevent, detect, investigate, and remediate phishing, malware, fraud, brand abuse, data leaks, external vulnerabilities, and more, ensuring continuous external protection from cyber threats.
Related topics