8 Steps to Avoid a Cybersecurity Attack

A discussion with two of Epicor’s cybersecurity leaders.

Hear from Epicor cybersecurity experts as they discuss strategies for avoiding a cyberattack.

Expert Panel:

Hosted by Kristin Valentyn, RVP, Strategic Alliances & Influencers

Featuring:

  • Rich Murr, SVP, Chief Customer & Information Officer
  • Sean Carr, Information Security Officer

Key Discussion Timestamps

4:29 - Ransomware Attacks Worldwide
5:45 - The Process of a Ransomware Attack, Phase 1: Infiltrate
7:00 - The Process of a Ransomware Attack, Phase 2: Attack
8:21 - The Process of a Ransomware Attack, Phase 3: Ransom
9:09 - Epicor IT Security Team
11:08 - Epicor IT Security Team Roles
17:03 - Security Tools and Investments
20:23 - 8 Steps to avoiding a Successful Attack
20:54 - 1: Employ skilled security experts
21:34 - 2: Patch All Systems
22:35 - 3: Implement the principle of least privilege
23:25 - 4: Segment networks (moving key systems to the cloud)
24:39 - 5: Implement endpoint and network traffic monitoring and detection
25:46 - 6: Implement ransomware-resilient backups
27:17 - 7: Conduct security awareness Training and Testing
27:57 - 8: Protect external facing applications with multi-factor authentication
28:46 - Tales From the Frontline
36:54 - Q&As

mfg-woman-engineer-checking-data - web_size_crop_jpg