Cloud Security , Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime

Defense Against Downtime: The Case for MDR

Tia Hopkins of eSentire on the Business Benefits of Managed Detection and Response
Tia Hopkins, field CTO and chief cyber risk strategist, eSentire

We have seen how ransomware can cripple an enterprise. But what about the threat of downtime revenue disruption - what toll can it exact? Tia Hopkins of eSentire discusses the role of managed detection and response in preventing downtime disruption.

In this video interview with Information Security Media Group, Hopkins discusses:

  • The threat of downtime disruption;
  • The cost of operating a 24/7 SOC;
  • Rock-solid elements of the business case for MDR.

Find out your downtime cost for a cyberattack with eSentire's Downtime Calculator and download your custom report for additional industry insights and details on the costs of building a 24/7 Security Operations Center in-house plus how to understand the value of partnering with eSentire.

Hopkins is focused on engaging with the cybersecurity community, providing thought leadership, supporting strategic customer and partner engagements, and working closely with the sales, marketing, product, engineering, and customer success teams to drive initiatives focused on security outcomes. In her career of over 20 years, she has held various IT and IT security roles and has over a decade of experience in the managed services space. Hopkins is also an adjunct professor of cybersecurity at Yeshiva University.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.