People, process, and tools – keeping cyber attackers at bay (Accedian)
How long does it take for sophisticated attackers to take advantage of a minor slip-up or human error? Approximately 47 seconds, according to the eye-opening experience of one client.On this episode of Decrypted Chatter, our host, Mike Canney of Accedian, welcomes UnderDefense’s CEO, Nazar Tymoshyk. UnderDefense is a globally top-ranked firm by Gartner and Clutch, who provides cyber resiliency consulting and technology-enabled services to anticipate, manage and defend against cyber threats.
Mike and Nazar focus on cyber resilience and the people, processes, and tools that make up these ever-important strategies. They also discuss business continuity, how to prepare for and react in the face of disaster or cyber attack, and what recovery plans are most effective in staying cyber resilient during these events.
You’ve got some tools in place, so where should you look next in terms of hardening your organization’s cyber resiliency?
Mike and Nazar’s very topical conversation revolves around cyber resilience and business continuity. Today, more and more companies are getting breached and may not even know it. It’s no longer a matter of “if”, but “when” it can happen to you. So, how can you prepare most effectively? One suggestion, getting the people, processes, and tools in place. Listen in as they discuss how taking appropriate actions, being prepared, and knowing your assets and risks can save your organization many times over. What are the crown jewels your organization must protect at all costs? It’s time to start mulling it over!
Listen to this episode of Decrypted Chatter on your favorite Podcast platform – Spotify, Apple Podcasts and Google Podcasts. Don't miss an episode! Follow or subscribe to the podcast so you don’t miss the discussions on the latest and greatest networking and cybersecurity topics!
About Decrypted Chatter
Decrypted Chatter is aimed at taking complex technical topics and breaking them down into easy to understand concepts with the help of gurus from across the IT and cybersecurity ether. Topics range from cybersecurity, cyber resilience, network performance, performance troubleshooting, and everything in between.