Page 31 - index
P. 31







To learn what you SHOULD do in the event of an attack, take a look at our eGuide, ““Five Things
To Do After You've Been Hacked,” which provides you with a plan of action to improve your
response and mitigate the impact of attacks now and in the future.




About the Author

Todd Weller, VP, Corporate Development, joined Hexis Cyber Solutions in March 2014. His
responsibilities include analyst relations, competitive and market intelligence, corporate visibility,
M&A, and strategic partnership development. Todd draws on his 17+ years of experience as an
equity research analyst where he covered the security industry for much of that time. In his equity
research career Todd provided research coverage of over 60 companies across several technology
sectors, including security, infrastructure software, data center/cloud hosting, and healthcare IT.

Connect with Hexis online: http://www.hexiscyber.com/

Hexis Blog: http://www.hexiscyber.com/blog

Twitter: @hexis_cyber

LinkedIn: https://www.linkedin.com/company/hexis-cyber-solutions
































31 Cyber Warnings E-Magazine – February 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   26   27   28   29   30   31   32   33   34   35   36