Risk-Based Security Testing

"Risk-based security is a popular concept, but what about applying it to penetration testing, reporting and remediation? Pete Wood and his team have been working on this concept. Blending threat and risk analysis with traditional penetration testing to produce techniques, results and guidance tailored to an individual organisation’s risk profile and attack surface. Learn more with case studies and real-world results.

Peter is a world-renowned security evangelist, speaking at conferences and seminars on ethical hacking and social engineering. He has appeared in documentaries for BBC television, provided commentary on security issues for TV and radio, and written many articles on a variety of security topics"
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Wealth Wizards: Threat Detection with Amazon GuardDuty and Alert Logic

Alert Logic

As part of its broader Managed Threat Detection and Response offering, Alert Logic provides an AWS-native security service that shows why, where, and how to respond to Amazon GuardDuty findings, while continuously assessing AWS configurations to find exposures and recommend actions that prevent future compromises. In this webinar, you'll learn how Wealth Wizards, a financial services company, utilizes AWS services such as Amazon GuardDuty and leverages Alert Logic to gain additional security context, actionable remediation steps, and protection.
Watch Now

2019 Vulnerability Management Predictions

Nopsec

Michelangelo Sidagni, CTO and Parag Baxi, VP of Product Management, discussed customer comments from 2018. They covered vulnerability management complaints, requests, wishes and hopes. They have set some goals for the vulnerability management market for 2019 and discussed those goals on this webinar! Michelangelo & Parag Covered: Vulnerability scanning goals. Determining asset value. Attack Predictions: when will a vulnerability become dangerous? Vulnerability categorization. Remediation Goals.
Watch Now

ON-DEMAND WEBINAR Why Cyber-Physical Convergence Really Matters

Security leaders have been discussing the convergence of cybersecurity and physical security for years. But what does it really mean and why does it matter? In this session we’ll discuss: The evolution of converged security Cyber-physical security convergence vs. security convergence Preparing for, and protecting against, cyber-
Watch Now

After updatein The Expanding Attack Surface: 5 Tips to Manage Third-Party Risk

BitSight

As organizations increase their reliance on third-party vendors for outsourced solutions, they expand their attack surface. Today’s digital environment offers tremendous opportunities for modern organizations. At the same time, there is more risk. Vulnerabilities and infections plague organizations around the globe — and their numbers continue to rise. The tips discussed in this webinar will help you start managing third-party risk to centralize your program and get a preliminary perspective of the risks you face. Once this foundation is established, you can build on it and shift to a more proactive approach to managing third-party risk — and limiting your exposure.
Watch Now