Date icon.
July 11, 2022
Time icon.
4
 min read

Cyber Strategy Q&A: Cybersecurity Workshops, Protecting Critical Business Assets

CyVig has scheduled a series of cybersecurity workshops, like our Cyber Happy Hours, and other events to provide straight talk and experienced perspectives on how businesses can protect their critical assets from cyber threats like malware, ransomware, and phishing.

CyVig co-founder and Chief Information Security Officer Chris Riley responds to some burning questions about CyVig’s new events series, how business leaders protect their critical assets, and how CyVig’s security program is designed to augment a company’s existing IT team without taking over.

Check out upcoming CyVig workshops and other events at cyvig.com/events.  

Oops! Something went wrong - please try again.

What motivates you to speak at cybersecurity conferences, webinars, and other events? 

I want to pay it forward! There wasn’t the same level of information sharing or industry support earlier in my career. Today, I think it’s beneficial for security experts to share a no-nonsense, non-tool approach to our work, no matter what forum we’re in. When I present, I try to take the IT security industry buzzwords out of the dialogue so business owners and executives can better understand the real risks and how they apply to their organizations.  

What are some of the most persistent cybersecurity questions that you get from attendees at recent CyVig events about how to protect business assets against cyber threats?

As CyVig co-founder and CEO Jeff Emmons and I have learned from recent events like a July cybersecurity workshop in Scottsdale that many business leaders are curious about the difference between information technology, or IT, and information security, or cybersecurity – and why many companies struggle to address those two distinct and necessary business functions.  

We’ve scheduled a series of cybersecurity workshops, like our Cyber Happy Hours, and other events to get more of the important in-person engagement around issues like protecting your critical business assets. We look forward to meting more people this summer who want straight talk and experienced perspectives on protecting their businesses from cyber threats like malware, ransomware, and phishing.

Jeff and I continue to hear from quite a few business leaders who are concerned about their own aptitude for risk to their business, based on what they end up learning about cyber realities, but who are very interested in breaking through the conjecture around IT security issues. It’s alarming for many to consider how cyber threats affect third-party vendors, supply chain relationships, clients of all types, and every employee in the company.

How does the CyVig security solution augment or support a company’s existing IT team?  

CyVig places an emphasis on monitoring your security program rather than taking over your environment. Our solution stack goes beyond the scope of many MSPs to focus on proactive security measures that address advanced, persistent threats and free your IT team to take on more revenue-generating projects.  

Our team provides oversight of your entire attack surface. We discuss any events or alerts, correlate activity from Edge-to-End, and communicate regularly with your IT team so your entire organization has the easy-to-visualize data on your current cybersecurity posture.  

"It’s alarming for many to consider how cyber threats affect third-party vendors, supply chain relationships, clients of all types, and every employee in the company." - Chris Riley, CyVig CISO


How is the CyVig team organized? 

I’m thrilled to be building such a diverse group of security experts for our clients. We have network subject matter experts, malware and reverse cybersecurity engineers, and SIEM engineers — all under a SOC director who ran IT security for a public transit authority and served as Information Assurance Manager for a company that secured satellite communications for Air Force One — among other experienced analysts.   

Our team is structured to augment our client’s in-house IT team or MSP handling specific elements of the firewall, Edge to Endpoint Protection, plus the triage of alerts and incidents, and countless other issues.  

Your message has been submitted.
We will get back to you as soon as we can.
Oops! Something went wrong.

Latest articles

Browse all