8 Steps to Avoid a Cybersecurity Attack
A discussion with two of Epicor’s cybersecurity leaders.
Hear from Epicor cybersecurity experts as they discuss strategies for avoiding a cyberattack.
Expert Panel:
Hosted by Kristin Valentyn, RVP, Strategic Alliances & Influencers
Featuring:
- Rich Murr, SVP, Chief Customer & Information Officer
- Sean Carr, Information Security Officer
Key Discussion Timestamps
4:29 - Ransomware Attacks Worldwide
5:45 - The Process of a Ransomware Attack, Phase 1: Infiltrate
7:00 - The Process of a Ransomware Attack, Phase 2: Attack
8:21 - The Process of a Ransomware Attack, Phase 3: Ransom
9:09 - Epicor IT Security Team
11:08 - Epicor IT Security Team Roles
17:03 - Security Tools and Investments
20:23 - 8 Steps to avoiding a Successful Attack
20:54 - 1: Employ skilled security experts
21:34 - 2: Patch All Systems
22:35 - 3: Implement the principle of least privilege
23:25 - 4: Segment networks (moving key systems to the cloud)
24:39 - 5: Implement endpoint and network traffic monitoring and detection
25:46 - 6: Implement ransomware-resilient backups
27:17 - 7: Conduct security awareness Training and Testing
27:57 - 8: Protect external facing applications with multi-factor authentication
28:46 - Tales From the Frontline
36:54 - Q&As