Avatar

Another day, another hack. It seems like every time we turn on the news, we are hearing about another company that has been breached. Hackers are not going away and are getting progressively sophisticated as companies struggle to equip their security teams with the tools and expertise to protect their assets. Partnering with a security services provider has become a common practice when faced with worries over understanding and investigating the threat landscape, as well as responding to a breach. Not every company that wants to grow has the extra time and resources to deal with the daily barrage of attacks.

Concerns over cybersecurity are impeding innovation – too much is at stake to risk. The damage caused by breaches goes far beyond the time and money it takes to deal with outage; the substantial impact comes from tainted reputation and lost business opportunity. Forced to deal with an involuntary disclosure of a breach, companies are increasingly looking to external experts for security guidance around preparing, managing, responding to, and recovering from incidents quickly and effectively.

 

How do you think companies should fight back? How to remove the burden of detection, investigation and remediation from the in-house security teams? What about recovering a network and rebuilding trust after a breach – when is the time to turn to an expert?

Join #CiscoChat on Wed, June 7th at 11AM PST to talk about alleviating the stress of dealing with the advanced threat landscape.

 

 

To participate in the #Ciscochat:

  • Make sure you’re logged into your Twitter account.
  • Follow @CiscoServices on Twitter.
  • Search for the #CiscoChat hashtag and click on the Latest tab.
  • Add to the conversation by using the #CiscoChat hashtag in your tweets. This way, others can find your contributions to the discussion.
  • When replying to specific participants, add a “.” at the beginning of the tweet so your question or comment will appear in your public twitter feed.
  • If you need multiple tweets to answer a question, preface each tweet with “1A,” “2A,” etc. This will make it easier for others to follow along with the conversation.

 

Welcome introductions and questions will begin at 11am PT. Don’t forget to bring your own questions to the discussion, too. See you there!

 



Authors

Sean Mason

Director, Threat Management & Incident Response

Cisco Security Advisory Services