Webinars

A Practical Guide to Attack Surface Management

Webinar - A Practical Guide to Attack Surface Management Register now A Practical Guide to Attack Surface Management aims to provide practical tips and best practices to help organisations implement a comprehensive and effective attack surface management program. Attack Surface Management is a security practice aimed at identifying, managing, and mitigating potential attack vectors in an organisation’s IT environment. In today’s digital world, where businesses are becoming increasingly reliant on technology, Attack Surface Management is a crucial component of an overall security strategy. Who should attend? – CISOs – Security Architects and Strategists – Offensive Security specialists – Security Operations professionals When? Wednesday, March 22 2023, 10:00 - 11:00 GMT Register now

By |2023-03-30T17:09:12+00:00March 6th, 2023|Events|Comments Off on A Practical Guide to Attack Surface Management

Vendor Risk Assessments in 60 Minutes

Vendor Risk Assessments in 60 Minutes When  information security teams are overburdened, evaluating vendor and enterprise risks can quickly consume far too much time and budget. Many organisations rely on a one-size-fits-all assessment, delivering a selection of PDF's, MS Word documents, Excel spreadsheets, and emails linking to a variety of online portals. These assessments are inflexible and time-consuming, allowing for only a limited amount of data to be processed. The review process also ends up frustrating both staff and vendors, the makings of an efficiency nightmare. Assessing vendors for cyber risk is important and necessary, particularly if you share data with an external party, currently taking 4 weeks on average per entity to complete cyber risk assessments. The good news is that it doesn't have to be that way. This article shows how cyber risk assessments can be completed to the same level of detail in as little as 60

By |2023-03-30T17:09:52+00:00March 15th, 2021|Blog|Comments Off on Vendor Risk Assessments in 60 Minutes

Webinar – Automated Breach & Attack Simulation vs Penetration Testing to validate security controls

Webinar - Automated Breach & Attack Simulation vs Penetration Testing to validate security controls Register now Register now

By |2023-03-30T17:09:54+00:00March 2nd, 2020|Events|Comments Off on Webinar – Automated Breach & Attack Simulation vs Penetration Testing to validate security controls

Webinar: Using the FAIR Model to Quantify Cyber Risk for 3rd Parties

Using the FAIR Model to quantify Cyber Risk for 3rd parties - Recorded webinar View webinar recording Understanding the true and realistic financial impact on the cyber risk that key 3rd party organisations pose to your business has been a hugely complex and expensive challenge to solve. Until now. Join this webinar to learn more about how NormShield has incorporated the Fair® cyber risk quantification model into its cyber risk assessment platform to provide instant and dynamic visibility of the financial impact and likelihood of a breach with 3rd parties that you do business with. If your business could be affected by a major cyber incident with one of your 3rd parties, you should attend this session. Suggested audience: - CISOs - Cyber risk/GRC specialists - Third Party Risk Managers - IT Governance professionals View webinar recording

By |2023-03-30T17:09:54+00:00February 25th, 2020|Events|Comments Off on Webinar: Using the FAIR Model to Quantify Cyber Risk for 3rd Parties