Moving your security strategy from reactive scramble to proactive risk management

Share this article:
Moving your security strategy from reactive scramble to proactive risk management
Moving your security strategy from reactive scramble to proactive risk management

Date: Wednesday, May 27, 2009
Time: 2:00 p.m. EST/11:00 a.m. PST

Click here to view on demand


Taking a reactive approach to IT security is a risky proposition. Besides presenting unnecessary operational hurdles, making patch, update and configuration decisions based on a flood of data from disparate scanning and logging solutions can still leave the door open to attack.

 

During this presentation, Dr. Eric Cole will demonstrate how a proactive enterprise security testing program can give you a new perspective on your organization's overall risk preparedness. You'll learn how to gain actionable data about the health of your environment, adding efficiencies to your security practices while optimizing business operations.

Dr. Cole will show you how to leverage proactive security testing programs to:

  • Maximize remediation efficiency by proactively identifying and addressing exploitable weaknesses rather than blindly patching and updating systems.
  • Assess the real impact of potential attacks by tracing paths of exposure from low-level systems to mission-critical information assets.
  • Assign security resources intelligently to address critical risks while minimizing business interruptions.
  • Justify security initiatives by sharing clear assessments of enterprise risk preparedness with colleagues in the line of business.
You'll also see how the right security testing data can resonate with business leaders -- opening the lines of communication and ultimately enabling the business through risk mitigation, added operational efficiencies, regulatory compliance, and improved customer satisfaction and retention.

Featured speaker:

Dr. Eric Cole, Chief Security Strategist, Secure Anchor

Sponsored by

Core Security Technologies is the leader in comprehensive security testing software solutions that IT executives rely on to expose vulnerabilities, measure operational risk, and assure security effectiveness. The company's CORE IMPACT product family offers a comprehensive approach to assessing the security of network systems, endpoint systems, email users and web applications against complex threats. All CORE IMPACT security testing solutions are backed by trusted vulnerability research and leading-edge threat expertise from the company's Security Consulting Services, CoreLabs and Engineering groups.

 

Share this article:

Sign up to our newsletters

More in Vendor Webcasts

Threat intelligence revolution

Real-world intelligence has been used for thousands of years to thwart an enemy's intentions. With the evolving sophistication of cyber threats growing at a rapid pace, today, internet and network connectivity has become the lifeblood of enterprise operations.

How PCI 3.0 impacts your security posture & compliance

During this webinar Christopher Strand, Senior Director of Compliance at Bit9 + Carbon Black and Mordecai Kraushar, Director of Audit at CipherTechs will review how the update to PCI DSS 3.0 will impact your systems and cybersecurity.

Persistent Threats are ever evolving. Is your security?

These are trying times for IT professional. Each and every day you face the risk of your network being hacked by the newest zero-day threat. Recently, it was the HeartBleed bug and then the IE vulnerability.