Having an incident response plan is one thing; being able to execute that plan when a crisis hits is a whole different ballgame. Holding regular tabletop exercises will not only help your team prepare for the worst, it will help you identify gaps in your current plan. In this episode of CYBER24, presented by VLCM, we talk with a panel of experts who share their perspective on what makes for an effective tabletop exercise. This is part one of a two-part discussion.
Cybersecurity Training & Exercises
Panelists:
- Mike Hussey, executive director of the Utah Dept. of Technology Services and the state CIO
- Phil Bates, chief information security officer in the Utah Dept. of Technology Services
- Dan Schuyler, Cybersecurity Solutions Architect, VLCM
- Anthony Booyse, Channel Sales Engineer Utah & New Mexico, Sophos
Subscribe: Apple Podcasts | Android | Google Podcasts | Stitcher | TuneIn | RSS
This episode of Cyber24 was sponsored in-part by Sophos Phish Threat. Protect your perimeter, protect your machines, and now train your users not to click on suspicious emails in the first place. You’ll be up in minutes. You can segment your employees by department, and a dashboard will inform you how many messages were sent out, who has clicked, and who has gone through training. Sophos Phish Threat: create a culture of careful clicking. Learn more at vlcm.com/phish.
Listen, CISOs, we KNOW how hard it is to manage your security posture. With often DOZENS of different security technologies that vary in process, application, and responding to, wouldn't it be nice if you had security baked into your actual server hardware?
HPE's Gen10 servers offer exactly that. As Utah's biggest HPE Platinum Partner, VLCM believes that your server infrastructure should be your strongest defense. Protect your enterprise with innovations in firmware protection, malware detection, and firmware recovery - right down to the silicon. Learn more about the servers that transform your business at vlcm.com/gen10.
About Cyber24
CYBER24 is a podcast and website designed to bridge the knowledge gap between cybersecurity experts, business leaders and policy makers. We talk with experts who share their knowledge in an easily understandable formate designed to arm public and private sector leaders with the information they need to protect their organizations.