EVENT REVIEW: ePLDT launches cyber-security solutions for businesses

ePLDT kicks off the year with launching their most advanced and extensive cyber safety and security solutions portfolio for local enterprises at the Hacker's Code event.

The event featured the world's most famous hacker, Kevin Mitnick. He gained notoriety as one of the FBI's most wanted for hacking over 40 top U.S. corporations. Mitnick highlighted the threat of social engineering and the need to combat it with security awareness training, and the regular security penetration testing.

The event was co-presented by the global IT security provider, Check Point Software Technologies. The Hacker's Code event gathered guests from the worlds of banking and finance industry, manufacturing, healthcare, BPO, and government sectors.

 Cyber security should no longer be viewed as ‘optional’, especially in today’s constantly changing landscape. As cyber threats become more complex, we at the Enterprise Group assure our customers that we can provide them with equally evolving and sophisticated services that can keep them protected, said Jovy Hernandez, SVP & Head of PLDT and Smart Enterprise Groups.

ePLDT unveiled their security ecosystem that houses three pillars. The first one covers the cyber-security consultation that includes risk management, and vulnerability assessment. The second pillar covers the management of security platforms by the ePLDT's pool of experts. And lastly, the third pillar covers the incident response that includes the proactive monitoring and response to cyberattacks.

The threats we all face are evolving and becoming more advanced at an alarmingly rapid rate. It is critical that we are ready and we accept that no company or individual is 100% safe from any breach. Thus, as business leaders and protectors of your organizations, you can no longer afford to be ill-prepared in today’s world. Preparedness means being ready before, during and after an attack, said Nerisse Ramos, SVP and Chief Operating Officer of ePLDT Group.

This review and other great information can be found at source.

Source: Giz Guide

Topics: Social Engineering, vulnerability assessment, famous hacker, penetration testing, security consultation, ePLDT, cyber security, cyber threats, Hacker's Code, keynote speaker, risk management, IT, Check Point Software Technologies, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

Redefining Your Enterprise’s Cyber Security Posture During Mergers & Acquisitions

With 3,205 data compromises occurring in 2023 alone, fortifying your enterprise’s cybersecurity posture is more important than ever.

Read more ›

Choosing a Penetration Testing Company for Mac-based Environments

Powering your business with Apple devices because of their reputable security and privacy features? You may be surprised to learn that while Apple dev..

Read more ›

AI in Cyber Security: Impacts, Benefits, and More To Be Aware Of

Artificial intelligence in cybersecurity has been a hot topic lately, especially with the rise of OpenAI’s ChatGPT. But does that mean it would make a..

Read more ›
tech-texture-bg