HANOVER, Md., May 27, 2014 (GLOBE NEWSWIRE) -- Hexis Cyber Solutions (Hexis), a wholly-owned subsidiary of The KEYW Holding Corporation (Nasdaq:KEYW), and a provider of advanced cyber security solutions for commercial companies and government agencies, will be hosting complimentary webinars on May 28 & 29 discussing how organizations can prepare for breaches to their networks. These webinars will be led by industry experts and analysts speaking to the ways in which organizations can mitigate the risk involved with cybersecurity.
WHAT: "Cyber Attack Strategies: Faster, Smarter, More Agile"
WHEN: Wednesday, May 28, 2014, 2:00 p.m. ET
In just hours, adversaries are able to breach environments. Detecting and containing a breach can take up to months or even worse, years. Are you willing to put your organization at risk? Forrester analyst and guest speaker, Rick Holland will explore how the cybersecurity game has changed and in order to protect your organization, you must in turn change your strategy. Holland will also discuss:
- Forrester's "Targeted Attack Hierarchy of Needs" analysis,
- Why technology force multipliers relieve the strain on your security staff,
- How automation must be leveraged to improve reaction times,
- Why prevention isn't dead but has changed to help you stay ahead of intruders.
To register for this webinar, please visit: bit.ly/1h4u2cg
WHAT: "You've Been Breached, Now What?"
WHEN: Thursday, May 29, 2014, 9:00 a.m. ET
Headlines are splattered with information on the latest breach and information security professionals are beginning to accept that it's now a matter of "when" a company is breached and not "if." This webinar, led by Brian Honan, CEO of BH Consulting, Bob Tarzey, Quocirca analyst and director and Richard Park, Hexis director of product management, will discuss why organizations need to consider the strengths of automated incident response and malware removal. This webinar will:
- Consider the unique challenges of dealing with an Advanced Persistent Threat,
- Offer advice on five things to do after an attack,
- Look at the necessity of security automation and consider how to overcome typical automation roadblocks,
- Discuss how to implement automated malware removal and incident response.
To register for this webinar, please visit: bit.ly/1lGDNA2
About Hexis Cyber Solutions
Hexis Cyber Solutions, Inc., a wholly-owned subsidiary of The KEYW Holding Corporation (Nasdaq:KEYW) based in Hanover, Maryland, provides complete cybersecurity solutions for commercial companies, government agencies, and the Intelligence Community (IC).
Our mission is to ensure that business IT infrastructure is equipped with tools and capability to detect, engage, and remove both external and internal cyber threats. Cyber terrorists, organized crime, and foreign governments focus tremendous effort on commercial, government, and military interests as their prime target. Hexis Cyber Solutions' HawkEye family of products offer active, multi-disciplined approaches to achieve a higher standard of cybersecurity that is based on our expertise supporting our nation's cybersecurity missions to ensure that your business or organization can operate at its maximum potential. For more information contact Hexis Cyber Solutions, 7740 Milestone Parkway, Suite 400, Hanover, Maryland 21076; Phone 443-733-1900; Fax 443-733-1901; E-mail email@example.com; or on the Web at www.hexiscyber.com.
KEYW provides agile cyber superiority, cybersecurity, and geospatial intelligence solutions for U.S. Government intelligence and defense customers and commercial enterprises. We create our solutions by combining our services and expertise with hardware, software, and proprietary technology to meet our customers' requirements. For more information contact KEYW Corporation, 7740 Milestone Parkway, Suite 400, Hanover, Maryland 21076; Phone 443-733-1600; Fax 443-733-1601; E-mail firstname.lastname@example.org; or on the Web at www.keywcorp.com.
Forward-Looking Statements: Statements made in this press release that are not historical facts constitute forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995. Such statements include but are not limited to statements about expected improvement and growth in our Government Solutions and Commercial Cyber Solutions segments during the remainder of 2014, statements about our future expectations, plans and prospects, and other statements containing the words "estimates," "believes," "anticipates," "plans," "expects," "will," "potential," "opportunities", and similar expressions. Our actual results, performance or achievements or industry results may differ materially from those expressed or implied in these forward-looking statements. These statements involve numerous risks and uncertainties, including but not limited to those risk factors set forth in our Annual Report on Form 10-K, dated and filed March 10, 2014 with the Securities and Exchange Commission (SEC) as required under the Securities Act of 1934, and other filings that we make with the SEC from time to time. Due to such uncertainties and risks, readers are cautioned not to place undue reliance on such forward-looking statements. KEYW is under no obligation to (and expressly disclaims any such obligation to) update or alter its forward-looking statements whether as a result of new information, future events or otherwise.