A cyber breach is like a punch in the face. And like Mike Tyson says, "Everyone has a plan, until they get punched in the mouth."

What if you could stop cybersecurity threats in real time without any delay? What most MDR providers don't want you to know is their traditional security systems with inherent latency in threat detection and response leave a window for attackers to exploit vulnerabilities.

The good news is that zero-latency response bridges this gap by providing immediate mitigation capabilities. CyberMaxx has coined this zero-latency response, "The Big R."

Join us for an engaging panel discussion as we explore "The Big R." During this event, our dynamic group of cybersecurity professionals will share the importance of immediate threat response and delve into critical aspects of what you need to know to build a response program to help avoid those direct hits.  

This educational discussion will focus on six basic response areas:

•    Recovery and Risk: Understanding the balance between recovering from incidents and managing ongoing risks.  
•    Setting Up for Success: Strategies to best prepare your organization for effective remediation when a cyber incident occurs.  
•    Common Pitfalls: Identifying where most remediation steps fail, what areas most organizations overlook, and how to avoid these common mistakes.  
•    Defining Remediation: What exactly is remediation in the context of cybersecurity?  
•    Timeline of Remediation: When does the remediation process actually start, and when is it officially over?  
•    Building Your Remediation Team: Tips on creating a dedicated team to handle remediation efforts efficiently.

Your key take-aways from this session will be:

•    Why "The Big R" reduces your impact of a data breach 
•    The top benefits a SOC provides your business 
•    How AI helps and the pitfalls to avoid   
•    The ins and outs of the detection and response 
•    The state of ransomware

Attendees are eligible to receive 1 CPE credit.

Generously supported by:

supported by logo
Speakers
speaker photo
Gary Monti
SVP, Security Operations, CyberMaxx

Gary Monti serves as Senior Vice President of Security Operations, leading the CyberMaxx Managed Security Services, Professional Security Services, Engineering, Product Management, and Customer Experience teams with emphasis on protecting our clients through innovative solutions, with a philosophy of thinking like an adversary while defending as a guardian. MaxxMDR brings a comprehensive approach to continuous threat exposure monitoring, threat detection, and response with threat hunting as integral to preserving the business assets of CyberMaxx clients. Gary has served as keynote speaker for Networking in the 21st Century. Presenting at BlackHat, ComNet, InterOp, and Microsoft Global Summit. Also, a published author of Networking Complete (Sybex) as well as numerous trade publications.

speaker photo
Erica Smith
Director of Managed Services (SOC), CyberMaxx

Erica Smith currently serves as the Director of Managed Services (SOC) for CyberMaxx. Previously, she held senior roles at Avertium and Secureworks, earning respect for her technical expertise and advocacy for her team. Erica is passionate in placing the customer first, advocating for her team and maintaining technical aptitude that earns her the respect of colleagues and customers alike.

speaker photo
Keith Strassberg
Chief Strategy Officer, CyberMaxx

Keith Strassberg is an accomplished cybersecurity executive with over two decades of experience in leadership, technology strategy, and cybersecurity solutions. He joins CyberMaxx as our Chief Strategy Officer expanding the Executive Leadership role he held at Cybersafe Solutions. He has spent the last seven years as Cybersafe’s Chief Operating Officer, driving company growth and innovation in the rapidly evolving cybersecurity landscape.

Moderator
speaker photo
Thomas Pioreck
CISO, CyberMaxx

Thomas Pioreck is CyberMaxx's Chief Information Security Officer and brings two decades of experience in the IT and security space, having recently served in the same role at CyberSafe Solutions. Thomas has implemented and maintained enterprise levels of application approval listings, antivirus, and EDR deployments. His experience includes performing as the primary threat analyst and program creator for incident response, risk assessments, vulnerability management, and multifactor authentication projects. Thomas worked to advise and/or implement a number of security frameworks, including HIPAA, GDPR, and a number of the NIST frameworks for organizations of various sizes across various verticals. He has collaborated to build out operational processes and procedures that allow an organization to operate at speed and with efficiency, without creating friction from a security standpoint.