Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Have Companies Inadvertently Exposed Their Data in Their Efforts to Protect From COVID-19?

Columbia University, Oppenheimer, and the FBI Join Tetherview’s Summit on Cyber Security in a Post COVID-19 World

TetherView, the creators of the Digital Bunker, hosted the Third Annual TetherView Cyber Security Summit “Controlling IT Chaos in Post COVID-19 World” bringing together distinguished speakers from the FBI, Oppenheimer, Columbia University, Cyxtera (CFG), and Akamai (AKAM).

The Summit brought a unique perspective on the COVID-19 pandemic and the ongoing challenges it presents to business executives and communities. Industry experts provided eye-opening insights on new and increasing cyber-threats including gaming attacks and Zoom Bombings, along with practical advice on how they can prepare for long term potential effects of COVID-19.

Recommended AI News: Microsoft Cloud For Healthcare Launched; Takes The Limelight In Fight Against COVID-19

“Due to the COVID-19 pandemic, millions of employees are working from home across a variety of network connections and devices, accessing and sharing data in an insecure manner putting their organization’s data at a huge risk,”  said Michael Abboud, CEO of TetherView and Summit host. “To combat these risks, TetherView leverages its Digital Bunker solution and frictionless cloud technology to expedite an organization’s remote enablement strategy and to keep employees and data safe. Going into our third annual Summit, we knew it was critical to call upon a panel of experts to chart a path forward to help companies keep their employees safe and their data secure.”

The prestigious lineup of keynote speakers included: Richard Jacobs, Assistant Special Agent-in-Charge of the Cyber Branch, FBI New York; Tom Cowan, Associate Director, Columbia University Center for Technology Management; Shaul Eyal, Managing Director-Research, Oppenheimer & Co; Timothy Horran, Managing Director, Oppenheimer & Co; Les Brun, Director, Merck and Broadridge Financial Solutions; Leo Taddeo, President, Cyxtera Federal Group (CFG), Former FBI Cyber Security Special Agent In Charge; Jay Coffey, Mayor, City of Oceanport, NJ; John Summers, Senior Vice President and General Manager of Web Security, Akamai (AKAM); and Michael Abboud, CEO, TetherView.

Related Posts
1 of 33,668

The Virtual Summit had two panel discussions, as well as two keynote addresses on Security and Cloud Market Outlook. The first panel, titled Defining IT Chaos, shed light on topics as far-reaching as the economic effects of the pandemic, to specific topics like virtual company culture and the importance of finding ways to make human contact in this work-from-home environment.

Recommended AI News: FourthWall Media Enhances Reveal Platform and Leaps to Cross-Platform Media Analytics

When asked about the potential second wave of the virus and how it can impact our economy, Les Brun said, “The world is going to start rebuilding, then stop again, and then start again until we have a better sense of a benchmark of how we operate in this new normal.”

The second panel, titled Cyber Security Best Practices, focused on the changes and the surprisingly fast increase in the frequency of cyber-attacks. According to the group, cyber-attacks are up 30-40%. Additional topics discussed touched the importance of establishing a zero-trust policy; and the dangers of remote access to data and e-mail, and the co-mingling of personal and business data.

“There needs to be security mechanisms on every single device that has access to corporate data and many companies currently do not have this in place,” said Shaul Eyal.

“Our unique approach to cloud computing ensures that compliance, security, productivity, and user experience is top of mind,” said Abboud. “These are the four key components to Cyber Security success in a digital workforce.”

Recommended AI News: QCI Achieves Best-In-Class Performance with Its Mukai Quantum-Ready Application Platform

Comments are closed, but trackbacks and pingbacks are open.