Page 31 - index
P. 31
To learn what you SHOULD do in the event of an attack, take a look at our eGuide, ““Five Things
To Do After You've Been Hacked,” which provides you with a plan of action to improve your
response and mitigate the impact of attacks now and in the future.
About the Author
Todd Weller, VP, Corporate Development, joined Hexis Cyber Solutions in March 2014. His
responsibilities include analyst relations, competitive and market intelligence, corporate visibility,
M&A, and strategic partnership development. Todd draws on his 17+ years of experience as an
equity research analyst where he covered the security industry for much of that time. In his equity
research career Todd provided research coverage of over 60 companies across several technology
sectors, including security, infrastructure software, data center/cloud hosting, and healthcare IT.
Connect with Hexis online: http://www.hexiscyber.com/
Hexis Blog: http://www.hexiscyber.com/blog
Twitter: @hexis_cyber
LinkedIn: https://www.linkedin.com/company/hexis-cyber-solutions
31 Cyber Warnings E-Magazine – February 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide