Moving your security strategy from reactive scramble to proactive risk management

Share this article:
Moving your security strategy from reactive scramble to proactive risk management
Moving your security strategy from reactive scramble to proactive risk management

Date: Wednesday, May 27, 2009
Time: 2:00 p.m. EST/11:00 a.m. PST

Click here to view on demand


Taking a reactive approach to IT security is a risky proposition. Besides presenting unnecessary operational hurdles, making patch, update and configuration decisions based on a flood of data from disparate scanning and logging solutions can still leave the door open to attack.

 

During this presentation, Dr. Eric Cole will demonstrate how a proactive enterprise security testing program can give you a new perspective on your organization's overall risk preparedness. You'll learn how to gain actionable data about the health of your environment, adding efficiencies to your security practices while optimizing business operations.

Dr. Cole will show you how to leverage proactive security testing programs to:

  • Maximize remediation efficiency by proactively identifying and addressing exploitable weaknesses rather than blindly patching and updating systems.
  • Assess the real impact of potential attacks by tracing paths of exposure from low-level systems to mission-critical information assets.
  • Assign security resources intelligently to address critical risks while minimizing business interruptions.
  • Justify security initiatives by sharing clear assessments of enterprise risk preparedness with colleagues in the line of business.
You'll also see how the right security testing data can resonate with business leaders -- opening the lines of communication and ultimately enabling the business through risk mitigation, added operational efficiencies, regulatory compliance, and improved customer satisfaction and retention.

Featured speaker:

Dr. Eric Cole, Chief Security Strategist, Secure Anchor

Sponsored by

Core Security Technologies is the leader in comprehensive security testing software solutions that IT executives rely on to expose vulnerabilities, measure operational risk, and assure security effectiveness. The company's CORE IMPACT product family offers a comprehensive approach to assessing the security of network systems, endpoint systems, email users and web applications against complex threats. All CORE IMPACT security testing solutions are backed by trusted vulnerability research and leading-edge threat expertise from the company's Security Consulting Services, CoreLabs and Engineering groups.

 

Share this article:

Sign up to our newsletters

More in Vendor Webcasts

The NIST Framework: The Public's Stake in the Cybersecurity of our Critical ...

The announcement in February 2014 by the White House of a Framework for the development of cybersecurity standards follows the announcement one year earlier by the White House of a Presidential Executive Order describing the Government's overall policy toward the cybersecurity on our nation's critical ...

An Enterprise Security Platform Approach to Advanced Persistent Threats

Today's advanced persistent threats (APTs) evade traditional security controls with techniques such as SSL encryption and require an integrated, simple and automated approach that can detect and defend at each stage of an attack.

Addressing Identity and Access Management with a Unified Open source Identity and ...

Many IT organizations today are tasked to manage a complex landscape that includes a mix of SaaS applications and on-premise applications being accessed by various user populations; employees, customers, mobile workers, etc.