Attack Surface Management: Discover and Secure Your Unknown Internet Exposure at Scale

June 30, 2022 | 10:00 AM EDT | USA

Attack Surface Management
Exploiting public-facing applications is one of the most common attack vectors to gain initial access and launch cyber-attacks. The average enterprise runs 464 custom applications, driven by accelerated digital transformation during the pandemic. However, the actual number is much higher due to shadow IT, making it difficult for security teams to secure the “unknown” and keep track of their evolving attack surface.
Register Now

Spotlight

Every organization--and every vendor--is unique. Thus, many circumstances will warrant the creation of customized security questionnaires. We suggest using industry-accepted best practices as a starting point for your assessment. Our goal with this guide is to help you get started with the creation of your vendor security risk a

OTHER LIVE WEBINARS

NISO Webinar: Cybersecurity

October 12, 2022 | 11:00 AM ET

This NISO educational event will bring together a group of experts in systems and cybersecurity to discuss the key challenges currently facing the information community. From issues of authentication to the threats posed by ransomware, all organizations must prioritize protections for digital identities and assets.
Register Now

Re-inventing Cyber-Strategy for Startups

December 22, 2022 | 5:30 AM ET

As part of our new cyber security brand called Offenselogic, we are inviting you and your startups to take part in the webinar.
Register Now

Live Q&A with the founder of the National Cyber Security Centre

June 29, 2022 | 11:00 AM EST

On 29 June, Legal IT Insider will be hosting a live virtual Q&A with Ciaran Martin CB, the founder and first CEO of the National Cyber Security Centre, which is part of GCHQ. Hosted in association with global cybersecurity company Red Sift, for which Martin is a special adviser, we welcome all of your questions around cybersecurity and risk and Martin will give us his thoughts on:
Register Now

Using Threat Modeling to Improve Enterprise Cyber Defenses

June 28, 2022 | 10:30PM IST

As enterprises deal with multiple threats coming in different forms, security teams are shifting to a risk-based security to handle these challenges. One of the key tools is threat modeling, a process intended to help identify potential weaknesses and prioritize how to fix them. In this webinar, experts discuss how to define security requirements, pinpoint and quantify potential vulnerabilities, and prioritize remediation methods. Learn how to conduct a threat modeling exercise and make risk-based decisions to strengthen your organization’s security.
Register Now

Spotlight

Every organization--and every vendor--is unique. Thus, many circumstances will warrant the creation of customized security questionnaires. We suggest using industry-accepted best practices as a starting point for your assessment. Our goal with this guide is to help you get started with the creation of your vendor security risk a

resources