The worst time to make decisions is in the heat of the moment. When your business is hit with a cyberattack, you need a strategy in place to respond to the threat while getting your team back up and working as quickly as possible.
In this episode of the CYBER24 podcast, presented by VLCM, we discuss the first two steps many businesses take when creating an incident response plan: determining key stakeholders and identifying critical assets. Time is money and that is especially true when a hacker has knocked your business offline. Over the next few weeks, we’ll walk through the main points you should include as you prepare for the worst.
Panelists:
Dan Schuyler, VLCM
Anthony Booyse, Sophos
Paul Whittier, Checkpoint
Marty Ca
Subscribe: Apple Podcasts | Android | Google Podcasts | Stitcher | TuneIn | RSS
This episode of Cyber24 was sponsored in-part by Aruba ClearPass. At VLCM, we know IT departments are overwhelmed with too many technologies to manage, too many alerts to weed through, and have too little staff to do it all. To help lighten the load WHILE eliminating blind spots, we highly recommend adopting Aruba ClearPass in your environment. From IoT to an always-on mobile workforce - especially now - organizations are more exposed to attacks then ever before. With Aruba ClearPass, you can get AGENTLESS visibility and dynamic role-based control for seamless security enforcement and response across your wired AND wireless networks.How's that for making things easier?
This episode of Cyber24 was sponsored in-part by Sophos Phish Threat. Protect your perimeter, protect your machines, and now train your users not to click on suspicious emails in the first place. You’ll be up in minutes. You can segment your employees by department, and a dashboard will inform you how many messages were sent out, who has clicked, and who has gone through training. Sophos Phish Threat: create a culture of careful clicking. Learn more at vlcm.com/phish.
About Cyber24
CYBER24 is a podcast and website designed to bridge the knowledge gap between cybersecurity experts, business leaders and policy makers. We talk with experts who share their knowledge in an easily understandable formate designed to arm public and private sector leaders with the information they need to protect their organizations.