EVENT REVIEW: ePLDT launches cyber-security solutions for businesses

ePLDT kicks off the year with launching their most advanced and extensive cyber safety and security solutions portfolio for local enterprises at the Hacker's Code event.

The event featured the world's most famous hacker, Kevin Mitnick. He gained notoriety as one of the FBI's most wanted for hacking over 40 top U.S. corporations. Mitnick highlighted the threat of social engineering and the need to combat it with security awareness training, and the regular security penetration testing.

The event was co-presented by the global IT security provider, Check Point Software Technologies. The Hacker's Code event gathered guests from the worlds of banking and finance industry, manufacturing, healthcare, BPO, and government sectors.

 Cyber security should no longer be viewed as ‘optional’, especially in today’s constantly changing landscape. As cyber threats become more complex, we at the Enterprise Group assure our customers that we can provide them with equally evolving and sophisticated services that can keep them protected, said Jovy Hernandez, SVP & Head of PLDT and Smart Enterprise Groups.

ePLDT unveiled their security ecosystem that houses three pillars. The first one covers the cyber-security consultation that includes risk management, and vulnerability assessment. The second pillar covers the management of security platforms by the ePLDT's pool of experts. And lastly, the third pillar covers the incident response that includes the proactive monitoring and response to cyberattacks.

The threats we all face are evolving and becoming more advanced at an alarmingly rapid rate. It is critical that we are ready and we accept that no company or individual is 100% safe from any breach. Thus, as business leaders and protectors of your organizations, you can no longer afford to be ill-prepared in today’s world. Preparedness means being ready before, during and after an attack, said Nerisse Ramos, SVP and Chief Operating Officer of ePLDT Group.

This review and other great information can be found at source.

Source: Giz Guide

Topics: Social Engineering, Speaking Engagements, vulnerability assessment, penetration testing, security consultation, ePLDT, cyber security, Hacker's Code, risk management, IT, Check Point Software Technologies, cyber attack, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

6 Types of Social Engineering Attacks and How to Prevent Them

Social engineering attacks account for a massive portion of all cyber-attacks.

Read more ›

What You Get When You Invest in Social Engineering Testing with Mitnick Security

When testing your employees' social engineering readiness, your teams need simulated attacks that feel as if they’re coming from a nefarious engineer...

Read more ›

Mitnick Security: Ransomware Awareness Training

Ransomware is a type of malware that prevents accessibility to either a single computer or an entire network until a ransom is paid. This can result i..

Read more ›
tech-texture-bg