28 08, 2020

Implement, Train & Monitor: Successful Cybersecurity Implementation Strategies

2020-08-28T12:28:58-04:00August 28th, 2020|Categories: MIDMRKT Virtual Recordings|Tags: , , |

Moderated by: Peter Karlson, CEO, MIDMRKT PANELISTS Heather Herringer, VP of Information Technology, Nielsen Massey Vanillas Todd Hamlin, Senior Manager, IT Infrastructure, Massimo Zanetti Beverage Chris Livanos, CIO, Motion Picture & Television Fund Brook Shuford, CISO, Datavail Michael Hamilton, CISSP, CISO, President, and Founder CI Security Now that you have identified your threats [...]

22 03, 2018

Endpoint Cyber Security: Any Dwell Time Is Too Much

2018-03-25T14:43:21-04:00March 22nd, 2018|Categories: Security|Tags: , , |

The prevailing model of endpoint cyber security is: monitor, detect, and respond. The idea is to find attacks once they’re inside your infrastructure but before they can do any damage. First, learn about attacks from some source and then reduce their dwell time by updating endpoint sensors or patching before a breach. In other words, [...]

Go to Top