EVENT REVIEW: ePLDT launches cyber-security solutions for businesses

ePLDT kicks off the year with launching their most advanced and extensive cyber safety and security solutions portfolio for local enterprises at the Hacker's Code event.

The event featured the world's most famous hacker, Kevin Mitnick. He gained notoriety as one of the FBI's most wanted for hacking over 40 top U.S. corporations. Mitnick highlighted the threat of social engineering and the need to combat it with security awareness training, and the regular security penetration testing.

The event was co-presented by the global IT security provider, Check Point Software Technologies. The Hacker's Code event gathered guests from the worlds of banking and finance industry, manufacturing, healthcare, BPO, and government sectors.

 Cyber security should no longer be viewed as ‘optional’, especially in today’s constantly changing landscape. As cyber threats become more complex, we at the Enterprise Group assure our customers that we can provide them with equally evolving and sophisticated services that can keep them protected, said Jovy Hernandez, SVP & Head of PLDT and Smart Enterprise Groups.

ePLDT unveiled their security ecosystem that houses three pillars. The first one covers the cyber-security consultation that includes risk management, and vulnerability assessment. The second pillar covers the management of security platforms by the ePLDT's pool of experts. And lastly, the third pillar covers the incident response that includes the proactive monitoring and response to cyberattacks.

The threats we all face are evolving and becoming more advanced at an alarmingly rapid rate. It is critical that we are ready and we accept that no company or individual is 100% safe from any breach. Thus, as business leaders and protectors of your organizations, you can no longer afford to be ill-prepared in today’s world. Preparedness means being ready before, during and after an attack, said Nerisse Ramos, SVP and Chief Operating Officer of ePLDT Group.

This review and other great information can be found at source.

Source: Giz Guide

Topics: Social Engineering, Speaking Engagements, vulnerability assessment, penetration testing, security consultation, ePLDT, cyber security, Hacker's Code, risk management, IT, Check Point Software Technologies, cyber attack, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

The Growth of Third-Party Software Supply Chain Cyber Attacks

When testing your employees' social engineering readiness, your teams need simulated attacks that feel as if they’re coming from a nefarious engineer...

Read more ›

Bypassing Key Card Access: Shoring Up Your Physical Security

As you build additional layers of defense into your cybersecurity framework, it's important to implement physical security strategies as well.

Read more ›

How to Prioritize Your Pentesting Report’s Remediation Recommendations

If you recently received a penetration test, you’re on the right track to improving your cybersecurity posture. However, you may be wondering what the..

Read more ›
tech-texture-bg