Andrew Brown

Home|Andrew Brown CTO, Elasticito

About Andrew Brown CTO, Elasticito

This author has not yet filled in any details.
So far Andrew Brown CTO, Elasticito has created 2 blog entries.

Webinar – Automated Breach & Attack Simulation vs Penetration Testing to validate security controls

Webinar - Automated Breach & Attack Simulation vs Penetration Testing to validate security controls Register now   Over 1,000 exploits and vulnerabilities are publicised every month. It is no longer effective to solely rely on point-in-time manual penetration tests to test your defences. In this webinar, you will learn how a new generation of automated Breach & Attack Simulation solutions are transforming the way that offensive security testing is conducted across the whole network, safely and continuously, to provide evidence-based data on the effectiveness of security controls. Who should attend? - CISOs - Security Architects and Strategists - Offensive Security specialists - Security Operations professionals When? Thursday 2 April 2020 at 10:00 GMT Register now  

By |2020-03-09T12:06:30+00:00March 2nd, 2020|Events|0 Comments

Why use the FAIR Model to quantify Cyber Risk for 3rd parties?

Why use the FAIR Model to quantify Cyber Risk for 3rd parties? Historically, questionnaires and or risk scoring have been the traditional tools used to evaluate the risk a 3rd party poses to an organisation. The Findings from questionnaires and risk scoring are often incredibly technical and complicated and are generally presented in heatmap style – red, orange, yellow, green – accompanied by a score and or letter grade, which aren't very useful in quantifying Risk to the business. To understand what the FAIR Model has to offer, let us first look at what we need to articulate to the Board or C-Level. In simplistic terms let’s begin by considering what Risk a 3rd Party could pose to an organisation if they were to share 2,000 data records with them. The Board or C-Level wants to know in financial terms what the cost to business will be if the 3rd Party is breached

By |2020-03-04T09:33:11+00:00January 28th, 2020|Blog|Comments Off on Why use the FAIR Model to quantify Cyber Risk for 3rd parties?