How to Effectively Handle Cyber Threats: Practical Tips and Strategies Explored
The intensity and volume of cyber threats and attacks have continuously increased over the past years. Businesses have become more prone to risks of cybersecurity breaches that management plans must not only be effective, but also aggressive.
To address this concern, it is imperative for businesses to have a solid foundation that will effectively secure and protect their network.
In this LIVE Webcast, cybersecurity experts Srikrupa Srivatsan (Infoblox) and Corey Maypray (Eli Lilly and Company) will provide the audience with an in-depth analysis of the fundamentals as well as recent developments concerning cyber threats and attacks. As experts, they will also provide practical tips and strategies in effectively handling this growing digital issue.
Key topics include:
- Cyber Threats: Trends Over the Past Years
- Common Risks and Challenges
- Effective Cyber Threat Solutions
- Practical Tips and Strategies
Digital transformation and evolving IT architectures greatly impact security. While the threat landscape continues to change, so do the complexity of networks, where data is stored and how end users connect.
- Edge computing, multi-cloud, SD-WAN and IoT have caused an increase in risk to a company’s infrastructure, data and brand. Security approaches need to change to address these transformations.
- Learn how to improve the efficacy of your existing security investments by using foundational infrastructure as an enforcement point and integrating the silos of security tools.
- Use contextual data for more efficient SecOps and threat prioritization.
Eli Lilly and Company
“If you know the enemy and yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.” - Sun Tzu
- Know yourself: Learn your environment (people, processes, technology).
- Know your adversary: Learn your adversaries motivations (motive and targeted data) and capabilities (attack methods, TTP’S and resources).
- Prioritize protection of your most critical assets and operations.
- Cyber security resources remain limited. Organizations that attempt to broadly protect their data from all cyber threats tend to inefficiently invest these resources, making them slower to adapt to the changing trends and techniques of cyber threats. – Carnegie Mellon
Who Should Attend:
- Chief Information Officers
- Chief Information Security Officers
- Chief Technology Officers
- Network Engineers and Managers
- Cyber Security Professionals
- IT VPs and Directors
- Operations and Incident Response Teams
Srikrupa has 20 years of experience in technology in various roles including software development, product management and product marketing. Currently, as Director of Product Marketing at Infoblox, she is responsible for messaging, positioning and bringing to market Infoblox’s security solutions that optimize security operations and provide foundational security against known and zero-day threats. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.
Srikrupa has 20 years of experience in technology in various roles including software development, product management and product marketing. Currently, …
Corey currently acts as an Advisor-Threat Intelligence and Detection for Eli Lilly and Company. In this role he is responsible for developing and maturing Lilly’s Information Security Cyber Threat Intelligence program and driving the creation of better threat detection capabilities. Prior to joining Lilly, Corey served twelve years in the Army as an All Source Threat Analyst where he performed a variety of intelligence functions including collection management, threat/intelligence analysis, and operational assignments to support operations abroad. Corey has specialties in threat entity targeting, open source intelligence collection, and intelligence support to counter terrorism, weapons of mass destruction, geo-political tensions, and cyber based threats.
Corey currently acts as an Advisor-Threat Intelligence and Detection for Eli Lilly and Company. In this role he is responsible …
Print and review course materials
Method of Presentation:
General knowledge of cybersecurity
NY Category of CLE Credit:
Law Practice Management
Unlock All The Knowledge and Credit You Need
Leading Provider of Online Continuing Education
It's As Easy as 1, 2, 3
Get Your 1-Year All Access Pass For Only $199
Infoblox enables next-level network experiences with its Secure Cloud-Managed Network Services. As the pioneer in empowering the world’s most reliable, secure and automated networks, we are relentless in our pursuit of network simplicity. A recognized industry leader, Infoblox has 50 percent market share for core network services, comprised of 8,000 customers, including 350 of the Fortune 500. Learn more at www.Infoblox.com. For more webinars: https://www.infoblox.com/company/informational-webinars/
About Eli Lilly and Company
Lilly was founded in 1876 by Colonel Eli Lilly, a man committed to creating high-quality medicines that met real needs in an era of unreliable elixirs peddled by questionable characters. His charge to the generations of employees who have followed was this: “Take what you find here and make it better and better.” More than 140 years later, we remain committed to his vision through every aspect of our business and the people we serve starting with those who take our medicines, and extending to health care professionals, employees and the communities in which we live.