Cyber Security Articles & News

EVENT REVIEW: ePLDT launches cyber-security solutions for businesses

ePLDT kicks off the year with launching their most advanced and extensive cyber safety and security solutions portfolio for local enterprises at the Hacker's Code event.

The event featured the world's most famous hacker, Kevin Mitnick. He gained notoriety as one of the FBI's most wanted for hacking over 40 top U.S. corporations. Mitnick highlighted the threat of social engineering and the need to combat it with security awareness training, and the regular security penetration testing.

The event was co-presented by the global IT security provider, Check Point Software Technologies. The Hacker's Code event gathered guests from the worlds of banking and finance industry, manufacturing, healthcare, BPO, and government sectors.

 Cyber security should no longer be viewed as ‘optional’, especially in today’s constantly changing landscape. As cyber threats become more complex, we at the Enterprise Group assure our customers that we can provide them with equally evolving and sophisticated services that can keep them protected, said Jovy Hernandez, SVP & Head of PLDT and Smart Enterprise Groups.

ePLDT unveiled their security ecosystem that houses three pillars. The first one covers the cyber-security consultation that includes risk management, and vulnerability assessment. The second pillar covers the management of security platforms by the ePLDT's pool of experts. And lastly, the third pillar covers the incident response that includes the proactive monitoring and response to cyberattacks.

The threats we all face are evolving and becoming more advanced at an alarmingly rapid rate. It is critical that we are ready and we accept that no company or individual is 100% safe from any breach. Thus, as business leaders and protectors of your organizations, you can no longer afford to be ill-prepared in today’s world. Preparedness means being ready before, during and after an attack, said Nerisse Ramos, SVP and Chief Operating Officer of ePLDT Group.

This review and other great information can be found at source.

Source: Giz Guide

Topics: Social Engineering, vulnerability assessment, famous hacker, penetration testing, security consultation, ePLDT, cyber security, cyber threats, Hacker's Code, keynote speaker, risk management, IT, Check Point Software Technologies, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

What is a Penetration Testing Framework?

Penetration testing services are performed by cybersecurity companies to help find weaknesses in an organization's network, internal systems, and show..

Read more ›

What To Expect During Red Team Operations

Companies are producing an exponential amount of data every day and by 2025, it’s estimated that there will be about 181 zettabytes of data. As your o..

Read more ›

4 Considerations When Choosing Between Pentesting Companies

As business models continue to evolve the need for cybersecurity measures is more necessary than ever before.

Read more ›
tech-texture-bg