Overcoming Modern Attack, Aplikas Servis Pesona Held a Cyber Security Webinar

11 November 2021 Marketing Aplikas

Overcoming Modern Attack, Aplikas Servis Pesona Held a Cyber Security Webinar

Cybercriminals usually use traditional methods to attack a company’s security system by starting the intrusion from the first step, which is gaining access from outside. Companies are also used to this old concept and stick to the usual types of prevention. In fact, cybercriminals currently only need 1 hour and 32 minutes to perform lateral movements and immediately get access to credentials.

Once the cybercriminals perform lateral movements and gain access to the credentials, the attacks will run very fast and pass your system easily. This fact shows clear proof that cybersecurity attacks are getting more modern. Therefore, more modern prevention and protection to overcome these issues are needed by companies. One of the strategies is implementing the Zero Trust Strategy, but many people still think it will be complicated to implement modern protection like this.

Aplikas Servis Pesona, a subsidiary of Phintraco Group that provides IT Security solutions, wants to raise practitioners’ awareness about the urgency of modern attacks. Therefore, Aplikas Servis Pesona and CrowdStrike held a webinar entitled “Defending the Modern Attack – Simplifying the Zero Trust Approach” on November 10, 2021. The theme aims to convey information about fighting modern attacks using a zero-trust approach solution. Participants of this webinar are IT security practitioners from various industries.

As a speaker for this webinar, Sherrie Tan, a Practice Lead Identity Protection from CrowdStrike Asia. Sherrie Tan began her presentation with an introduction to the urgency of attacks from more modern cybercriminals. Sherrie Tan also shows a demo of how CrowdStrike’s Zero Trust can help you overcome modern attacks.

Sherrie explained that there are 3 simple steps to overcome modern attacks: visibility, 360-detection, and prevention. Visibility is an effort to understand attacks from the surface, 360-detection is a user behavior detection capability, and prevention is done using MFA or blocking. All these steps can be done simply with Zero Trust Strategy. Another advantage of the Zero Trust Strategy is the ability to be integrated with Falcon EPP for better security. Therefore, with the solutions offered by CrowdStrike, you can detect in 1 minute, investigate in 10 minutes, and respond in 60 minutes for current modern attacks.

cyber security webinar

Sherrie Tan, a Practice Lead Identity Protection from CrowdStrike Asia, presented the material of the webinar entitled “Defending the Modern Attack – Simplifying the Zero Trust Approach”

In the question and answer session, Sherrie also explained more deeply the unique features and benefits of the solutions offered by CrowdStrike when compared to other vendors. She stated that many other cyber security vendors have the main challenge of only developing 1 part of the solution, whether the endpoint, network, or email, and integrating it with other products. From a security perspective, it is very inefficient to apply many products in a system to overcome all the existing problems. CrowdStrike provides a platform that focuses on all of the most important things in cybersecurity. It is surely well-integrated and handled by the experts from CrowdStrike. This will be very beneficial for the company because the security performance will not be overwhelming the device’s endpoint.

Implementing an optimized strategic approach will allow you to go further with advanced system security and lower the risk of cyberattacks. Not only that, but you can also easily prevent security problems, identify and respond to them quickly. Don’t be afraid to implement Zero Trust Strategy in your company’s systems because with CrowdStrike, the process will be fast and simple to execute.

If you want to know more about CrowdStrike and the Zero Trust Strategy, you can contact us via email at  marketing@phintraco.com.

Leave a Reply

Your email address will not be published. Required fields are marked *