HANOVER, Md., May 27, 2014 (GLOBE NEWSWIRE) — Hexis Cyber Solutions (Hexis), a wholly-owned subsidiary of The KEYW Holding Corporation (Nasdaq:KEYW), and a provider of advanced cyber security solutions for commercial companies and government agencies, will be hosting complimentary webinars on May 28 & 29 discussing how organizations can prepare for breaches to their networks. These webinars will be led by industry experts and analysts speaking to the ways in which organizations can mitigate the risk involved with cybersecurity.
WHAT: “Cyber Attack Strategies: Faster, Smarter, More Agile”
WHEN:Wednesday, May 28, 2014, 2:00 p.m. ET
In just hours, adversaries are able to breach environments. Detecting and containing a breach can take up to months or even worse, years. Are you willing to put your organization at risk? Forrester analyst and guest speaker, Rick Holland will explore how the cybersecurity game has changed and in order to protect your organization, you must in turn change your strategy. Holland will also discuss:
- Forrester’s “Targeted Attack Hierarchy of Needs” analysis,
- Why technology force multipliers relieve the strain on your security staff,
- How automation must be leveraged to improve reaction times,
- Why prevention isn’t dead but has changed to help you stay ahead of intruders.
To register for this webinar, please visit: bit.ly/1h4u2cg
WHAT: “You’ve Been Breached, Now What?”
WHEN: Thursday, May 29, 2014, 9:00 a.m. ET
Headlines are splattered with information on the latest breach and information security professionals are beginning to accept that it’s now a matter of “when” a company is breached and not “if.” This webinar, led by Brian Honan, CEO of BH Consulting, Bob Tarzey, Quocirca analyst and director and Richard Park, Hexis director of product management, will discuss why organizations need to consider the strengths of automated incident response and malware removal. This webinar will:
- Consider the unique challenges of dealing with an Advanced Persistent Threat,
- Offer advice on five things to do after an attack,
- Look at the necessity of security automation and consider how to overcome typical automation roadblocks,
- Discuss how to implement automated malware removal and incident response.
To register for this webinar, please visit: bit.ly/1lGDNA2
KeyW is an innovative national security solutions provider to the Intelligence, Cyber, and Counterterrorism communities. KeyW’s advanced technologies in cyber; intelligence, surveillance and reconnaissance; and analytics span the full spectrum of customer missions and enhanced capabilities. The company’s highly skilled workforce solves complex customer challenges such as preventing cyber threats, transforming data to actionable intelligence, and building and deploying sensor packages into any domain. For more information, please visit www.KeyWCorp.com and follow KeyW on Twitter @KeyWCorp.
Forward-Looking Statements: Statements made in this press release that are not historical facts constitute forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995. Such statements include, but are not limited to, statements containing the words “estimates,” “believes,” “anticipates,” “plans,” “expects,” ‘will,” “potential,” “opportunities,” and similar expressions. Our actual results, performance or achievements or industry results may differ materially from those expressed or implied in these forward-looking statements, including, but not limited to, express or implied statements concerning: our expectations regarding our future financial performance, including the potential impact of successful contract awards; our bid and proposal pipeline; our ability to achieve projected growth in certain of our business units and the expected timing of such growth; demand for our products, services and solutions serving the intelligence, cyber and counterterrorism communities; and performance of key contracts, including the timing of production related to certain of our contracts and product offerings. Factors that may cause our results to differ, potentially materially, from those expressed or implied in our forward-looking statements include, but are not limited to: risks to our business and financial results related to reductions and other spending constraints imposed on the U.S. Government, including as a result the Federal budget deficit and Federal government shut-downs; risks of adverse regulatory action or litigation; risks that changes, cutbacks or delays in spending by Intelligence Community (IC) customers, including the National Security Agency (NSA), the National Geospatial-Intelligence Agency (NGA), and other agencies within the IC, the Federal Bureau of Investigation, and the Department of Defense (DoD) may occur, which could cause delays or cancellations of key government contracts; risks of delays to or the cancellation of our projects as a result of protest actions submitted by our competitors; risks that changes may occur in Federal government (or other applicable) procurement laws, regulations, policies and budgets; risks related to changes in government and customer priorities and requirements (including cost-cutting initiatives, the potential deferral of awards, terminations or reduction of expenditures to respond to the priorities of Congress and the Administration; and those risk factors set forth in our Annual Report on Form 10-K, dated and filed March 16, 2018 with the Securities and Exchange Commission (SEC), and other filings that we make with the SEC from time to time. Due to such uncertainties and risks, investors are cautioned not to place undue reliance on such forward-looking statements. We are under no obligation to (and expressly disclaims any such obligation to) update or alter our forward-looking statements whether as a result of new information, future events or otherwise.
Director, Corporate Communications
Vice President, Investor Relations and Treasury