• 18 Aug, 2020
  • Location: PATechCon Virtual

Cybersecurity has become a big business for criminals and the fact that Government agencies are still being breached on a regular occurrence should have taxpayers furious. Most of these agencies are the cities, municipalities, and counties that we live in, but larger and larger entities also are getting caught without proper proactive security measures and no recovery or continuity plan. Often overlooked cybersecurity components that are critical to securing the smallest borough to the largest federal agency are one in the same. DNS scanning, firewalls, network infrastructure, patching, updates, and end user training are all crucial to a proactive plan of attack to maintain a secure network infrastructure. It is these components that are often time consuming or just simply ignored that allows a successful phishing attack access.

Reactive planning and validation are essential to any proactive plan. Being able to timely identify and then recover from an attack or hardware failure, and having the documentation in order sounds simple, but even many trusted IT vendors will fall short on providing a complete validated solution.

Attending this presentation, you will learn the questions to ask your IT staff or vendor to fully understand what your Recovery Time would be and where you fall short on a cybersecurity plan. As a bonus, we will highlight of some of the common and effective tools that should be utilized to protect your network infrastructure while maintaining security compliance.

It’s long overdue to take a serious look at your cyber security portfolio, making this the can’t miss presentation of PATechCon.

 

Contact Info

717.884.9030

Scott@ScottRDavis.com