2993: The Future of Cybersecurity Resiliency with Check Point Software
Tech Talks DailyAugust 14, 2024
2993
22:4814 MB

2993: The Future of Cybersecurity Resiliency with Check Point Software

What does it take for a business to survive and thrive in the face of cyber threats? In this episode, I sit down with Muhammad Yahya Patel from Check Point Software to explore the crucial concept of business resiliency in cybersecurity. As cyber attacks become more sophisticated and widespread, a business's ability to continue operating during and after an attack is more critical than ever.

Muhammad delves into the strategies that companies need to adopt to build a resilient cybersecurity framework, starting with identifying critical assets, ongoing risk assessments, and implementing multi-layered security measures.

We also discuss the significance of having a robust incident response plan and the importance of offsite backups and disaster recovery plans. In a world where email remains a primary attack vector—accounting for over 80% of initial cyber attacks in 2023—Muhammad emphasizes the need for advanced email security solutions. He shares insights on how AI and machine learning play a pivotal role in preventing email-based threats, from phishing to business email compromise.

The conversation then shifts to vulnerability management, which is essential to maintaining a solid security posture. Muhammad explains the importance of regularly patching vulnerabilities in software and hardware to prevent exploitation by attackers. He provides practical advice on how organizations can effectively identify, prioritize, and manage these vulnerabilities to reduce risks and maintain operational continuity.

Looking ahead, Muhammad is excited about quantum computing's potential to revolutionize data protection and enhance cybersecurity. He also highlights the ongoing advancements in AI and machine learning that push the boundaries of what's possible in cybersecurity, ensuring that the field remains dynamic and ever-evolving.

As we conclude the episode, one question remains: Is your business truly prepared to withstand the inevitable challenges of the cybersecurity landscape? What immediate steps can you take today to ensure long-term resiliency? The time to act is now.

[00:00:01] [SPEAKER_01]: How secure is your business in the face of relentless cyber threats?

[00:00:06] [SPEAKER_01]: Well, today on Tech Talks Daily I'm going to be joined by Mohammed Patal.

[00:00:11] [SPEAKER_01]: He's from Check Point Software and together we're going to delve into the critical world

[00:00:16] [SPEAKER_01]: of cybersecurity, vulnerability management and business resilience.

[00:00:21] [SPEAKER_01]: And with cyber attacks becoming a question of when rather than if, understanding how

[00:00:27] [SPEAKER_01]: to protect your core operations and maintain business continuity is more important than

[00:00:33] [SPEAKER_01]: ever.

[00:00:34] [SPEAKER_01]: So, Mohammed will share his insights on how to identify what your digital crown jewels are,

[00:00:40] [SPEAKER_01]: how to fortify your defenses with multi-layered security strategies and also talk about the

[00:00:46] [SPEAKER_01]: cutting edge advancements in things like AI and quantum computing and how they could revolutionize

[00:00:52] [SPEAKER_01]: our approach to cybersecurity.

[00:00:55] [SPEAKER_01]: I want to take a time out to express my gratitude to everyone who supports my mission of delivering

[00:01:00] [SPEAKER_01]: daily content to you in 165 countries.

[00:01:04] [SPEAKER_01]: I couldn't do it without you and I couldn't do it without my sponsors.

[00:01:07] [SPEAKER_01]: And today I want to give a quick shout out to Kiteworks, who recently told me that defense

[00:01:12] [SPEAKER_01]: contractors are facing immense pressure to comply with things like CMMC 2.0 security

[00:01:18] [SPEAKER_01]: standards and finding a secure, easy to use file sharing platform that meets those

[00:01:23] [SPEAKER_01]: guidelines can be a big challenge.

[00:01:26] [SPEAKER_01]: So quick shout out to any defense contractors listening out there.

[00:01:30] [SPEAKER_01]: CMMC 2.0 compliance doesn't have to be a headache.

[00:01:34] [SPEAKER_01]: Consider Kiteworks your fast track to authorization and as a FedRAMP moderate authorized solution

[00:01:40] [SPEAKER_01]: they cover nearly 90% of CMMC 2.0 level 3 requirements.

[00:01:46] [SPEAKER_01]: For you that means less time, less effort, less cost and while others struggle with

[00:01:50] [SPEAKER_01]: DIY approval processes and clunky apps, you'll breeze through with their zero trust

[00:01:56] [SPEAKER_01]: framework so don't let compliance slow you down is what I'm trying to say.

[00:02:00] [SPEAKER_01]: Simply visit Kiteworks.com to get started.

[00:02:03] [SPEAKER_01]: That's Kiteworks.com to learn more about Kiteworks' secure content platform

[00:02:08] [SPEAKER_01]: for CMMC compliance.

[00:02:10] [SPEAKER_01]: But with my thank yous out the way it's now time to jump right into today's interview

[00:02:14] [SPEAKER_01]: with a fantastic guest.

[00:02:17] [SPEAKER_01]: Well buckle up and hold on tight because no matter where you are in the world it's time

[00:02:22] [SPEAKER_01]: to beam your ears all the way to Blackburn here in the UK where our guest is waiting to join us.

[00:02:30] [SPEAKER_01]: So a massive warm welcome to the show.

[00:02:33] [SPEAKER_01]: Can you tell everyone listening a little about who you are and what you do?

[00:02:37] [SPEAKER_00]: Thanks for having me Neil, I'm a jihya Patel.

[00:02:40] [SPEAKER_00]: I have two jobs so let's kind of touch on them.

[00:02:43] [SPEAKER_00]: So I'm a senior pre-sales engineer here at Checkpoint Software

[00:02:47] [SPEAKER_00]: where a global cybersecurity solutions leader and the job here is to pretty much help

[00:02:54] [SPEAKER_00]: organizations with their sort of cybersecurity strategy and how we can sort of deliver

[00:03:00] [SPEAKER_00]: security value with sort of prevention based solutions.

[00:03:05] [SPEAKER_00]: The second hour at Checkpoint is so sub security evangelist within the

[00:03:11] [SPEAKER_00]: office of the CTO so I get involved with things like public speaking, engagement with

[00:03:18] [SPEAKER_00]: sort of academia and building that relationship and then contributing to industry articles and

[00:03:25] [SPEAKER_00]: media appearances every now and then as well.

[00:03:28] [SPEAKER_01]: Fantastic, it's a pleasure to have you join me on the podcast and every day I try and

[00:03:33] [SPEAKER_01]: hone in on certain areas that everyone's talking about in business and the effects

[00:03:37] [SPEAKER_01]: of whether it be cybersecurity or technology trends and there does seem to be a real big

[00:03:41] [SPEAKER_01]: focus at the minute on business resiliency especially after that huge IT outage we had

[00:03:47] [SPEAKER_01]: a few weeks ago.

[00:03:48] [SPEAKER_01]: So what does this mean though in the context of cybersecurity when we're talking about

[00:03:53] [SPEAKER_01]: business resiliency?

[00:03:54] [SPEAKER_01]: Can you just set the scene for our conversation?

[00:03:57] [SPEAKER_00]: I think it comes down to what's your approach when a cybersecurity attack happens or cyber

[00:04:03] [SPEAKER_00]: attack happens and if and not when a cyber attack comes along.

[00:04:08] [SPEAKER_00]: So I think it's that terminology of when the cyber attack happens and not if a cyber attack

[00:04:13] [SPEAKER_00]: happened so breaking it down into sort of simple terms.

[00:04:16] [SPEAKER_00]: If your business is in an unfortunate situation where a cyber attack is successful,

[00:04:21] [SPEAKER_00]: can your business survive in some way shape or form?

[00:04:25] [SPEAKER_00]: Can it carry on functioning or does everything kind of come to a halt?

[00:04:29] [SPEAKER_00]: So business resiliency comes down to can we continue running and keep parts of the business

[00:04:36] [SPEAKER_00]: even while attack is ongoing or even after a while while things are still recovering and

[00:04:42] [SPEAKER_00]: you're still going through the motions of what's just happened.

[00:04:46] [SPEAKER_00]: That's kind of how I'd kind of break down that kind of business resiliency with

[00:04:52] [SPEAKER_00]: when it comes to cybersecurity.

[00:04:54] [SPEAKER_01]: And as you said there, it's not a case of if you get attacked but when.

[00:04:59] [SPEAKER_01]: So with that very stark warning, what are the key strategies that any business leader listening

[00:05:05] [SPEAKER_01]: should be acting upon to develop that resilient cybersecurity framework to have a more proactive

[00:05:11] [SPEAKER_01]: approach rather than the traditional reactive?

[00:05:14] [SPEAKER_00]: Yeah. And this is something I guess I talked to many organizations about and we could probably

[00:05:19] [SPEAKER_00]: talk about this all day long but if we wanted to touch on a few key kind of aspects,

[00:05:27] [SPEAKER_00]: I guess we'd start off by saying the business needs to identify their crown jewels.

[00:05:34] [SPEAKER_00]: You'll find if you don't know what your crown jewels are, then how could you survive as a

[00:05:38] [SPEAKER_00]: business if you're not protecting it? So identify those crown jewels and then move on

[00:05:43] [SPEAKER_00]: to identify other assets systems and data within your organization.

[00:05:49] [SPEAKER_00]: I would then look at so performing a continuous risk assessment against the organization and

[00:05:55] [SPEAKER_00]: know I'm talking continuous and not a one off thing or a once a year thing.

[00:06:00] [SPEAKER_00]: And this will help so identify gaps and weaknesses.

[00:06:06] [SPEAKER_00]: Implement multi-layered preventatives or security measures to give the business the best fighting

[00:06:13] [SPEAKER_00]: chance. I think if you only got a single layer or you're only relying on one single thing to

[00:06:19] [SPEAKER_00]: protect you, you haven't really got a good chance. So having that multi-layered thing is

[00:06:23] [SPEAKER_00]: really good. Then I would look at having an internet response plan and test it regularly as well

[00:06:31] [SPEAKER_00]: to make sure it's up to date, to make sure the plan is still adequate for your size of business

[00:06:37] [SPEAKER_00]: and organization. And then the last point is sort of offline backups and DR plans

[00:06:47] [SPEAKER_00]: but having these off-site. So I talked to many organizations and some of them just

[00:06:53] [SPEAKER_00]: wouldn't realize that actually when a cyber attack happens, the systems that I have today

[00:06:59] [SPEAKER_00]: and the storage and data may not be available. And therefore these plans and backups that we

[00:07:06] [SPEAKER_00]: have are stored on the very systems that have just been sort of hijacked in an attack.

[00:07:11] [SPEAKER_00]: So taking those off-site somewhere else completely separate, put you in a pretty good

[00:07:17] [SPEAKER_00]: position. So those would be some of the key points. And then from a framework perspective,

[00:07:24] [SPEAKER_00]: if somebody wants to adopt a framework, probably the best one to start off with is the

[00:07:30] [SPEAKER_00]: NIST cybersecurity framework or NIST CSF. So yeah, those would be kind of my key takeaways

[00:07:39] [SPEAKER_00]: to go and do those things first. And I suspect there'll be a lot of people listening that know

[00:07:45] [SPEAKER_01]: they need to do something but not sure what to do or maybe the ROI of performing something like this

[00:07:51] [SPEAKER_01]: is unclear at the moment. And I appreciate you might not be able to mention any names here,

[00:07:56] [SPEAKER_01]: but are you able to share an example of someone that has effectively demonstrated business resiliency

[00:08:01] [SPEAKER_01]: during a cyber attack? Any any examples bring to mind?

[00:08:06] [SPEAKER_00]: Yeah, I think probably there is a name we can mention because it's in public media was the

[00:08:13] [SPEAKER_00]: ransomware attack against a company called Carmat. And they are one of the largest sort of

[00:08:20] [SPEAKER_00]: technology providers in the transportation industry who face a ransomware attack after

[00:08:26] [SPEAKER_00]: somebody clicked a malicious link in an email. But the key bit here is I guess looking at business

[00:08:32] [SPEAKER_00]: resiliency, they work within the trucking industry and that kind of sector. Their response was

[00:08:39] [SPEAKER_00]: sort of immaculate in terms of they were able to contain the attack within hours. The internal

[00:08:45] [SPEAKER_00]: system impact was minimal. And actually they were actually able to start communicating to their

[00:08:51] [SPEAKER_00]: customers, suppliers, partners immediately on the same day. And they had a communication plan.

[00:08:57] [SPEAKER_00]: And they were able to respond very quickly. And that's what business resiliency comes down to

[00:09:02] [SPEAKER_00]: can your business carry on? And in this instance, yes, they were able to carry on.

[00:09:07] [SPEAKER_00]: They had a response plan. And they were clearly well prepared for something like this. And for me,

[00:09:13] [SPEAKER_00]: for other people listening, they might be thinking, well, I've only got a small business or

[00:09:19] [SPEAKER_00]: I'm not a big cybersecurity or enterprise company. We're talking about a company here who operated in

[00:09:25] [SPEAKER_00]: transportation industry, probably not something that comes to mind in the first instance. But

[00:09:31] [SPEAKER_00]: there's probably one that you can check out. So if somebody looks up on Google or something,

[00:09:37] [SPEAKER_00]: Carmat ran somewhere attacked, they can read about it there in the public domain.

[00:09:42] [SPEAKER_01]: To avoid any confusion from people listening, many will hear the term vulnerability management

[00:09:49] [SPEAKER_01]: mentioned in the exact same sentences business resiliency. So just to clear that matter,

[00:09:54] [SPEAKER_01]: what would you say or how would you describe vulnerability management? And

[00:09:58] [SPEAKER_01]: how is it different? And why is that also crucial for businesses?

[00:10:02] [SPEAKER_00]: Yeah, so vulnerability management is more about the sort of security vulnerabilities within the

[00:10:11] [SPEAKER_00]: organization's technology landscape if you like. So you've got a business who's got hardware

[00:10:16] [SPEAKER_00]: and software within their organization. And these vulnerabilities are ultimately the weaknesses

[00:10:23] [SPEAKER_00]: within the technology that they've deployed. And these vulnerabilities can then be exploited by

[00:10:30] [SPEAKER_00]: an attacker. And if we're doing vulnerability management properly, we can help reduce the

[00:10:37] [SPEAKER_00]: risk of an attack. And I guess keep a healthy posture and sort of validated status back to

[00:10:44] [SPEAKER_00]: the business for regular purposes as well. So they are two distinctive things. We see

[00:10:51] [SPEAKER_00]: vulnerabilities being exploited day in, day out. But this is more about the underlying

[00:10:57] [SPEAKER_00]: technology infrastructure that you have within the organization that needs to be patched and

[00:11:03] [SPEAKER_00]: managed effectively to make sure that we were stopping all these kind of weaknesses and gaps

[00:11:08] [SPEAKER_00]: that exist in hardware and software that are always going to exist in some way, shape or form.

[00:11:14] [SPEAKER_00]: It's about keeping, keeping ahead and keeping on top of it.

[00:11:18] [SPEAKER_01]: And another weakness that lurks inside something that everyone uses, and that is of course email

[00:11:24] [SPEAKER_01]: and in recent years, it has often been the workers that have been lazily blamed for being

[00:11:30] [SPEAKER_01]: the weakest link in cybersecurity. But attacks are so sophisticated now, especially with

[00:11:35] [SPEAKER_01]: social engineering. And it's so easy for someone to go online, go on a LinkedIn profile, have a look

[00:11:41] [SPEAKER_01]: at the chief finance officer who's at a conference, get the email domain from the website and send

[00:11:47] [SPEAKER_01]: those phishing attacks or run somewhere attacks. So why would you say email security is so critical

[00:11:52] [SPEAKER_00]: for businesses today? Is it often overlooked? I guess it's overlooked in some areas but also

[00:12:01] [SPEAKER_00]: might not be considered as an area that needs protecting. But it's still the primary method

[00:12:07] [SPEAKER_00]: of communication today, either internally or externally within the business. And actually,

[00:12:13] [SPEAKER_00]: if we look at the cyber attacks today, overwhelmingly email is used as that sort of

[00:12:20] [SPEAKER_00]: initial attack factor and looking at some of the trends within the industry and the reports.

[00:12:27] [SPEAKER_00]: It was something like 80 odd percent of threats were delivered by email in 2023. So for that reason,

[00:12:36] [SPEAKER_00]: we need to be taking email security seriously if we're going to prevent some of these threats

[00:12:42] [SPEAKER_01]: from happening. And again, just to bring to life what we're talking about here,

[00:12:47] [SPEAKER_01]: what are some of the most common email based threats that businesses should be aware of out

[00:12:52] [SPEAKER_01]: there? Is it the same old, the usual suspects that we see and hear or the other emerging threats,

[00:12:58] [SPEAKER_00]: especially with AI, et cetera? Yeah, the usual suspects are there. And you mentioned one of

[00:13:04] [SPEAKER_00]: them, social engineering. That's a big thing now alongside business email compromised. We're

[00:13:10] [SPEAKER_00]: seeing more of whereby either a trusted employee or a supplier or a partner that you sort of

[00:13:17] [SPEAKER_00]: engage with, it actually has their mailbox compromised and they're now being impersonated

[00:13:24] [SPEAKER_00]: in some way. So you think you're engaging with your trusted supplier, they ask you for a payment

[00:13:31] [SPEAKER_00]: and you go ahead and make that payment. But actually what you didn't realize was that

[00:13:35] [SPEAKER_00]: supplier was actually compromised. The same usual sort of phishing techniques still exist

[00:13:41] [SPEAKER_00]: today with malicious links and attachments. And these links could be used to download malware

[00:13:49] [SPEAKER_00]: onto the machine, or the links could be used to steal user credentials as well.

[00:13:55] [SPEAKER_00]: Up and coming are things like malicious QR codes. There are things now as well. So you could

[00:14:01] [SPEAKER_00]: be receiving a QR code within an email, but actually there is a malicious link behind it

[00:14:06] [SPEAKER_00]: and it's how do we sort of stop these from happening and kind of stay ahead of some of these as well.

[00:14:15] [SPEAKER_01]: Fantastic advice. And the question I've got to ask and I appreciate this question is almost a

[00:14:20] [SPEAKER_01]: podcast episode on its own, but for any business leaders listening, how can organizations protect

[00:14:26] [SPEAKER_01]: their email systems more, especially from some of the threats you've just mentioned?

[00:14:31] [SPEAKER_00]: Yeah, and this is a question almost on a daily basis. I'm kind of engaging with businesses in the

[00:14:38] [SPEAKER_00]: UK to understand how we can do this. I think we need to adopt a prevention based email security

[00:14:46] [SPEAKER_00]: solution, which is using AI and machine learning kind of at the forefront to be able

[00:14:52] [SPEAKER_00]: to help and recognize some of these threats and actually move away from a detect and remediation

[00:14:59] [SPEAKER_00]: with long relied on legacy solutions that are still there or architecture,

[00:15:04] [SPEAKER_00]: which is not putting the organization in the best manner. So if we say once the malware is in, it's

[00:15:11] [SPEAKER_00]: too late, right? So that's where detects and remediate comes in, move to something that can

[00:15:16] [SPEAKER_00]: prevent these things from happening as best as we can. MFA on all your email accounts,

[00:15:22] [SPEAKER_00]: that's really easy to go on and turn on. So get your users engaged with you to understand why it

[00:15:30] [SPEAKER_00]: needs to be enabled. And even things like monitoring suspicious logon behaviors, if your

[00:15:36] [SPEAKER_00]: organization only works in the UK, should you have somebody from another country or another

[00:15:42] [SPEAKER_00]: region logging on? Can you monitor that? Those are some of the things that you want to be

[00:15:47] [SPEAKER_00]: looking at in terms of how we can protect the email system from these threats.

[00:15:54] [SPEAKER_01]: And we are talking about a lot of varied threats and attacks, but it's not all doom and gloom.

[00:15:59] [SPEAKER_01]: There is a lot to be hopeful for and maybe even excited. So I've got to ask,

[00:16:03] [SPEAKER_00]: what excites you about the future? Yeah, again, this could be an episode on its own.

[00:16:10] [SPEAKER_00]: I think there's a, I think what excites me is I still have a job in the industry with

[00:16:15] [SPEAKER_00]: everything that's happening. I'll still be kept in a job and that probably evolve in different ways

[00:16:21] [SPEAKER_00]: because the landscape is increasing. I think things like, want some computing is probably

[00:16:28] [SPEAKER_00]: something that excites me to see what's going to be the art of what's possible when it comes to

[00:16:33] [SPEAKER_00]: having better ways or faster ways of securing and protecting data to help kind of bolster

[00:16:42] [SPEAKER_00]: that security. AI is there, does it excite me? Not as much as what it did so early on.

[00:16:50] [SPEAKER_00]: We know it's there, we know it can be utilized, I guess there's probably more to come in that space.

[00:16:59] [SPEAKER_00]: And I guess the other bit that kind of is just around innovation within the field itself.

[00:17:05] [SPEAKER_00]: There is so much happening within the industry that it's hard to actually keep up. But yeah,

[00:17:12] [SPEAKER_00]: we have a role here in some of the cutting edge stuff. So that keeps it kind of pretty exciting.

[00:17:20] [SPEAKER_01]: And I love how you mentioned that quantum computing excites you. I'm curious,

[00:17:24] [SPEAKER_01]: it doesn't keep you awake at night, worrying about it breaking encryption or anything like

[00:17:29] [SPEAKER_01]: there's nothing like that concerning. No, no, not yet. There's definitely much less, I guess,

[00:17:38] [SPEAKER_00]: boring things that are keeping me and other people awake at night, which is some of the

[00:17:44] [SPEAKER_00]: more simple stuff that we could be doing to improve things. Love that. And absolutely

[00:17:50] [SPEAKER_01]: love chatting with you today. And before I let you go, I always try and find a little bit

[00:17:54] [SPEAKER_01]: more about my guest, we've talked about your hugely successful career, the amazing work that you're

[00:17:59] [SPEAKER_01]: doing. But of course, none of us are able to achieve any degree of success without a little

[00:18:03] [SPEAKER_01]: help along the way. And very often it's someone that's seen something in as invested a little time

[00:18:08] [SPEAKER_01]: in us and helped us in our career. So is there a particular person or people that you're

[00:18:14] [SPEAKER_01]: grateful towards who played a part in helping you thrive in your cybersecurity career?

[00:18:19] [SPEAKER_00]: Yeah, definitely. You're probably expecting to me to say someone sort of professional in my

[00:18:25] [SPEAKER_00]: professional life, but I'm going to go with personally here and go back to my roots and

[00:18:30] [SPEAKER_00]: my parents who pushed me to go down the apprenticeship route. So I didn't go to

[00:18:36] [SPEAKER_00]: university or get a degree, but they actually pushed me towards hands on learning on the job.

[00:18:42] [SPEAKER_00]: And so I started my career as an apprentice and it's always sort of been hands on learning.

[00:18:47] [SPEAKER_00]: So the success comes from parents who navigated me towards go out into the big bad world and just

[00:18:54] [SPEAKER_00]: get hands on and start learning some of this tech stuff that you seem to get and understand

[00:19:00] [SPEAKER_00]: and get excited about. So yeah, none of this would have been anywhere achievable without their

[00:19:07] [SPEAKER_00]: help and their pushing to kind of continue towards striving for the best.

[00:19:14] [SPEAKER_01]: What a beautiful answer. Absolutely loved that. And I think cybersecurity is one of those industries

[00:19:19] [SPEAKER_01]: where it is, I think they stopped it like 0% unemployment and there is a real opportunity

[00:19:24] [SPEAKER_01]: for people from such a variety of backgrounds that maybe they don't automatically

[00:19:29] [SPEAKER_01]: consider themselves techies. But with that hands on experience and studying in their own time,

[00:19:34] [SPEAKER_01]: there's a real opportunity there for other people to enter this industry, isn't there right now?

[00:19:39] [SPEAKER_00]: Definitely. There's a huge opportunity. There's a lot of people who are kind of re-skilling. So I've

[00:19:45] [SPEAKER_00]: worked with a couple of these groups around the UK and as you say, they come from diverse backgrounds,

[00:19:51] [SPEAKER_00]: not necessarily in cybersecurity, but they're actually re-skilling to enter the industry and

[00:19:56] [SPEAKER_00]: they bring along with them different experiences which can actually help them advance their

[00:20:01] [SPEAKER_00]: careers in the cyber world and actually help some of us in cyber with the experience that

[00:20:07] [SPEAKER_00]: they bring from very different backgrounds. So it's definitely an industry to be in and

[00:20:14] [SPEAKER_00]: not necessarily always think about being in the most advanced and technical role because there's

[00:20:20] [SPEAKER_00]: a huge wide gap in different areas and a lot of different specialisms that people could

[00:20:26] [SPEAKER_00]: jump in and get to grips with. Well, I echo everything you said there and I think

[00:20:33] [SPEAKER_01]: it's something we don't talk about enough. We've probably set off a lot of light bulb

[00:20:36] [SPEAKER_01]: moments. We've left people with a lot of different talking points and might have a few questions.

[00:20:41] [SPEAKER_01]: So where is the best place for anyone listening to find you or your team at Checkpoint Software,

[00:20:46] [SPEAKER_01]: learn more about anything we talked about today? Where would you like to point everyone?

[00:20:50] [SPEAKER_00]: Yeah, so I'm very active on LinkedIn. So connect me, chat with me there, engage on there

[00:20:56] [SPEAKER_00]: and of course if you want to learn more about prevention based solutions and architecture,

[00:21:02] [SPEAKER_00]: visit Checkpoint.com and yeah, that's the best way to reach us.

[00:21:08] [SPEAKER_01]: Well, we packed so much in our conversation today from demystifying business resiliency,

[00:21:14] [SPEAKER_01]: vulnerability management, email is a business critical tool and how to protect that but also

[00:21:20] [SPEAKER_01]: what you're excited about the future, why there's so much to be hopeful about and also

[00:21:24] [SPEAKER_01]: where you came from there and recognising the impact your parents have had on your career

[00:21:29] [SPEAKER_01]: and giving hope to other people out there that might be listening, this might be the moment that

[00:21:33] [SPEAKER_01]: we just light a spark where they too want to re-skill and enter the industry but just

[00:21:38] [SPEAKER_01]: thank you so much for shining a light on this today. Thank you, Neil.

[00:21:42] [SPEAKER_01]: We covered so much ground there discussing the essential elements of building a resilient

[00:21:47] [SPEAKER_01]: cyber security framework to shield your business from cyber threats, from fundamentals of email

[00:21:54] [SPEAKER_01]: security to the innovative frontiers of quantum computing. I think it's clear that staying ahead

[00:22:00] [SPEAKER_01]: requires constant vigilance and innovation but what steps will you take to ensure your business

[00:22:07] [SPEAKER_01]: remains resilient in that cyber battleground that we're talking about? As always, share your thoughts

[00:22:13] [SPEAKER_01]: and questions you may have and let's keep this crucial conversation going. Email techblogrideroutlook.com,

[00:22:20] [SPEAKER_01]: Twitter, LinkedIn, Instagram and Neil C Hughes. Pop me a DM in there if you've got a question or

[00:22:26] [SPEAKER_01]: anything at all. But that's it. I'm out of touch. You're out of time so it's time for me to go

[00:22:32] [SPEAKER_01]: now but thank you for listening as always and until next time. Don't be a stranger.