Webinar replay

A cyberattack occurs somewhere in the world every 11 seconds. And 73% of businesses say they were targeted by at least one ransomware attack in the past 24 months.

Against this ever-shifting threat landscape, enterprises need to realize that traditional disaster recovery does not equal cyber recovery. And the key discipline to embrace today is cyber resilience.

But what is cyber resilience in today's context? Resilience to what? What have we learned from the adversaries' latest tactics and targets?

Register to listen to the replay of this unique webinar and gain access to:

  • Lessons learned from cyberattacks and their true business impact
  • The three imperatives for comprehensive data protection
  • How Dell Technologies and DXC approach cyber resilience together

Speakers

Mark Hughes

General Manager, Security, DXC Technology

Mark Hughes is responsible for DXC’s Security business including cyber risk and compliance, digital identity, infrastructure, app and data protection, and cyber transformation and operations. He previously led DXC's offerings and strategic partners organization. A Royal Military Academy graduate and British Army veteran, Mark serves on the World Economic Forum’s Global Cybersecurity Board. Connect with him on LinkedIn.

Jim Shook

Global Director, Cybersecurity and Compliance Practice, Dell Technologies

Jim combines his computer science degree and technical experience with over a decade as a litigator and general counsel, helping customers to better understand cybersecurity best practices and related regulatory and legal concerns. Today he focuses mainly on ransomware and destructive attacks, and combating their impact with cyber resilience capabilities and technologies. Jim has led Dell Technologies' relationship with Sheltered Harbor and serves on its Joint Steering Committee. He is a long-time participant in, and contributor to, the Sedona Conference working groups on electronic information and cybersecurity and privacy. Connect with Jim on LinkedIn.

Featured content

Navigating the road to cyber resiliency

As part of the Cyber Resiliency Summit, sponsored by Dell Technologies, Mark Hughes joins theCUBE host Rob Strechay to discuss the strategies and tools that organizations can use to manage risk and guard against cyber threats.

Learn more: Documentation

  • DXC and Dell Technologies Partnership | Fact Sheet | Infographic
  • DXC Data Platform Vault: Protect your critical data and foundational technologies from cyber attacks and ransomware through our robust cyber recovery vault managed services. | Fact Sheet
  • How to Protect Against the Impacts of a Ransomware Attack | Brief

Learn more: Videos

Cyber Resiliency: End-to-end security across the modern IT infrastructure (with theCUBE)
  • Andrew Gonzalez, principal alliance lead, Cloud and Infrastructure Services, DXC Technology
  • Jim Shook, global director, Cybersecurity and Compliance Practice, Dell Data Protection
DXC Storage & Backup Cyber Vault powered by Dell Technologies

Learn about our complete suite of fully managed services that delivers robust data protection and recovery incident response services. With Cyber Vault incident response is 99.5% effective, delivering unmatched levels of security.

Cyberattack simulation: Tabletop exercise

As cyber threats become more sophisticated and attacks are ever more multifaceted, it is vital that organizations have a cybersecurity posture that takes into consideration a tiered defense.

It’s no longer a matter of if, but when your organization will be a victim of a cyberattack.

DXC’s cyberattack simulation, delivered as a tabletop exercise, emulates a customized cyberattack derived from real-world incidents and delivers the following benefits:

  • Simulate and train against modern attacks, customized to your organization.
  • Improve communication and cooperation among teams involved in incident response.
  • Define roles and responsibilities for faster response and improved confidence in an actual attack.
  • Documented actions provide insights for improving crisis procedures.

Read our Fact Sheet to learn more, and contact us to schedule a cyberattack simulation for your organization.