Moving your security strategy from reactive scramble to proactive risk management

Share this article:
Moving your security strategy from reactive scramble to proactive risk management
Moving your security strategy from reactive scramble to proactive risk management

Date: Wednesday, May 27, 2009
Time: 2:00 p.m. EST/11:00 a.m. PST

Click here to view on demand

Taking a reactive approach to IT security is a risky proposition. Besides presenting unnecessary operational hurdles, making patch, update and configuration decisions based on a flood of data from disparate scanning and logging solutions can still leave the door open to attack.


During this presentation, Dr. Eric Cole will demonstrate how a proactive enterprise security testing program can give you a new perspective on your organization's overall risk preparedness. You'll learn how to gain actionable data about the health of your environment, adding efficiencies to your security practices while optimizing business operations.

Dr. Cole will show you how to leverage proactive security testing programs to:

  • Maximize remediation efficiency by proactively identifying and addressing exploitable weaknesses rather than blindly patching and updating systems.
  • Assess the real impact of potential attacks by tracing paths of exposure from low-level systems to mission-critical information assets.
  • Assign security resources intelligently to address critical risks while minimizing business interruptions.
  • Justify security initiatives by sharing clear assessments of enterprise risk preparedness with colleagues in the line of business.
You'll also see how the right security testing data can resonate with business leaders -- opening the lines of communication and ultimately enabling the business through risk mitigation, added operational efficiencies, regulatory compliance, and improved customer satisfaction and retention.

Featured speaker:

Dr. Eric Cole, Chief Security Strategist, Secure Anchor

Sponsored by

Core Security Technologies is the leader in comprehensive security testing software solutions that IT executives rely on to expose vulnerabilities, measure operational risk, and assure security effectiveness. The company's CORE IMPACT product family offers a comprehensive approach to assessing the security of network systems, endpoint systems, email users and web applications against complex threats. All CORE IMPACT security testing solutions are backed by trusted vulnerability research and leading-edge threat expertise from the company's Security Consulting Services, CoreLabs and Engineering groups.


Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

More in Vendor Webcasts

Watering hole attacks: Detect end-user compromise before the damage is done

Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks.

The impact of endpoint data growth on corporate visibility & compliance

id you know that forty-six percent of IT knows or suspects employees are using their individual, non-IT approved cloud accounts to store corporate data?

Security in the new mobile ecosystem

A recent study, conducted by the Ponemon Institute, and commissioned by Raytheon, has revealed some interesting facts related to the adoption and barriers to mobile device usage in the workplace.