I have been hacked! Insights from a real-life case
IDC and Check Point Software Technologies are hosting a webinar where we will be discussing and sharing best practice approaches to securing your IT and hybrid cloud estates against attacks.
Everyone has heard of organizations that had their security breached, but what is it like to be hacked? What does the process from encountering the problem to solving the breach (or paying for it) actually look like?
The 2020 Cost of a Data Breach Report (Ponemon Institute) indicates that the average cost of a cybersecurity data breach is in the order of USD3.86 million. Loss of money notwithstanding, companies stand to lose a lot of credibility in a very public way if they fail to lock the gates on valuable customer data and allow cyber criminals to steal valuable data. Corporate reputation and trust is at stake and can be quickly damaged but take an age to restore. What are the trust metrics and what is the role of the CISO as we move towards a Future of Trust model? Cybercriminals, nation states, and hackers apparently do not rest even during a pandemic quarantine. A prime example of this is the Healthcare vertical market segment. The World Health Organization (WHO) reported that it has seen five times the number of cyberattacks on its organization since the start of the COVID-19 pandemic.
IDC and Check Point Software Technologies invite you to join a particularly thrilling webinar based on a real-life case, where Check Points Incident Response Team describes a worst-case hacking scenario of an AWS cloud environment. And more importantly: we will also discuss and address how you can prevent this from happening in the first place and look at which common mistakes were made and the impact it had on the business.
We will share best practice approaches to securing your IT and hybrid cloud estates against attacks. IDC will also give a market overview of the Future of Trust and how digital resilience is essential as businesses rebound and embrace opportunities of the new working norm.
The complete agenda, speakers and other event information can be found on the event's website.View Event Details
Videos & Presentations
IDC & Check Point Webinar
Research Director, European Security, IDC
VP Engineering, EMEA, Check Point Software Technologies
Tom De Laet
Incident Response & Digital Forensics Analyst, Check Point Software Technologies