Military-Grade Cyberattacks On The Rise
How Prepared Is Your Business?
Lunch Seminar – Learn The Strategy for Rapid Recovery
Current military-grade attacks are pushing existing cyber defenses to their limits.
Designed to penetrate the most hardened defenses, these attacks perform destructive operations against data, applications, and physical infrastructure.
These types of attacks are ramping up. And your system has never been tested for this style of cyberwarfare.
OVERVIEW
Please join us for a special lunch seminar to learn how to drastically speed recovery time - to minutes or hours instead of weeks - and significantly reduce the financial impact of a cyberattack.
Our expert speakers will share powerful insights including:
- What a hacker is doing just before the event
- How to rapidly detect breaches
- How to identify blind spots
- How sharply rising cyber insurance deductibles will impact your organization
- How to speed recovery with air gapping and intelligent security
The Speakers
Frank Welder
Technical Solutions Architect
Arrow Electronics, Inc. (NYSE: ARW)
Frank Welder is a well-respected security expert who has been fighting cybercrime since the 1990s.
As a speaker, Frank is professional and dynamic. His presentations are full of energy and excitement as he shares exceptional insight into the mind and actions of a hacker. Frank is able to bring you through the anatomy of a cyberattack while keeping you on the edge of your seat. Audiences give Frank high marks for eye-opening facts and useful advice for protecting against new and emerging threats.
Frank holds a MS degree in Information and Communications Sciences and a BS degree is Telecommunications from Ball State University. He has 25 professional licenses and certificates.
Tony Owens
Storage Solutions Architect
Arrow Electronics, Inc. (NYSE: ARW)
For over 20 years, Tony Owens has been a recognized leader in the Storage and IT space. His broad knowledge of storage solutions and technology has served countless Fortune 500 organizations.
Tony is passionate about technology and storage and is driven by a desire to help customers achieve success with the right solution. In each of his presentations, Tony brings the topic of storage to life with deep insight into considerations needed for optimizing data security. His extensive experience extends from mainframes to today’s sophisticated storage solutions.
Tony’s specialties cover storage, software-defined and hybrid multi-cloud. He has 48 professional certifications and badges with IBM, as well as additional certifications with AWS, Google, and other software vendors.
Reserve Your Seat Today
Each event is complimentary and includes access to the event, lunch and exclusive content.
San Diego, CA
September 22, 2022
Jersey City, NJ
October 20, 2022
The Agenda
11:30 AM - CHECK-IN
NOON - WELCOME & LUNCH ORDERS
12:15 PM - PRESENTATION + LUNCH
1:45 PM - Q&A SESSION
2:00 PM - CONCLUSION
Cyber Resilience News
X-Force Threat Intelligence Index 2022
The unprecedented Russian cyberwarfare threat against western interests has exacerbated an already perilous and complex threat landscape. In 2021, IBM Security® X-Force® saw how threat actors opportunistically used a shifting landscape to adopt tactics and techniques to successfully infiltrate organizations across the globe. Read this eBook to learn how to enhance your security posture so that you’re prepared for every known and unknown threat.
The Total Economic Impact™ Of IBM Security SOAR
Businesses like yours need more ways to address cybersecurity incidents faster and more consistently. Read this whitepaper to learn how companies are drastically reducing their time to resolution, improving their threat response, and producing a better overall security posture. Ready to hear more? Contact us for pricing and implementation details.
NRGi: Stepping Up Security with Centralized, Real-Time Threat Monitoring
With cyberattacks becoming ever-more sophisticated and aggressive, how can Danish utilities company NRGi improve its ability to protect its business systems against hackers and malware? Read this case study to learn how NRGi worked with IBM Gold Business Partner SecureDevice to deploy a central monitoring system that detects advanced threats automatically — enabling more proactive network security responses.
IBM QRadar on Cloud
As the threat landscape evolves, and the cyber security talent pool shrinks, your business can no longer rely on check-the-box compliance controls. You need comprehensive visibility into threats and risks within your environment so that you can better protect sensitive data and assets from advanced attackers. This whitepaper explores the advantages of using an enterprise-ready security intelligence solution, which can help organizations like yours gain an end-to-end security view across on-premises and cloud-based environments without requiring months of professional services or major customization investments.