Moving your security strategy from reactive scramble to proactive risk management

Share this article:
Moving your security strategy from reactive scramble to proactive risk management
Moving your security strategy from reactive scramble to proactive risk management

Date: Wednesday, May 27, 2009
Time: 2:00 p.m. EST/11:00 a.m. PST

Click here to view on demand

Taking a reactive approach to IT security is a risky proposition. Besides presenting unnecessary operational hurdles, making patch, update and configuration decisions based on a flood of data from disparate scanning and logging solutions can still leave the door open to attack.


During this presentation, Dr. Eric Cole will demonstrate how a proactive enterprise security testing program can give you a new perspective on your organization's overall risk preparedness. You'll learn how to gain actionable data about the health of your environment, adding efficiencies to your security practices while optimizing business operations.

Dr. Cole will show you how to leverage proactive security testing programs to:

  • Maximize remediation efficiency by proactively identifying and addressing exploitable weaknesses rather than blindly patching and updating systems.
  • Assess the real impact of potential attacks by tracing paths of exposure from low-level systems to mission-critical information assets.
  • Assign security resources intelligently to address critical risks while minimizing business interruptions.
  • Justify security initiatives by sharing clear assessments of enterprise risk preparedness with colleagues in the line of business.
You'll also see how the right security testing data can resonate with business leaders -- opening the lines of communication and ultimately enabling the business through risk mitigation, added operational efficiencies, regulatory compliance, and improved customer satisfaction and retention.

Featured speaker:

Dr. Eric Cole, Chief Security Strategist, Secure Anchor

Sponsored by

Core Security Technologies is the leader in comprehensive security testing software solutions that IT executives rely on to expose vulnerabilities, measure operational risk, and assure security effectiveness. The company's CORE IMPACT product family offers a comprehensive approach to assessing the security of network systems, endpoint systems, email users and web applications against complex threats. All CORE IMPACT security testing solutions are backed by trusted vulnerability research and leading-edge threat expertise from the company's Security Consulting Services, CoreLabs and Engineering groups.


Share this article:

Sign up to our newsletters

More in Vendor Webcasts

Life after a data breach: Identifying and containing advanced threats at the ...

Compromise can happen in seconds and containment can take weeks. For enterprises, it's no longer a matter of if you will be breached, but rather a matter of when.

Big Data - Your secret weapon in the war against cyber crime

Right now, Web attackers are amassing a global arsenal of knowledge and resources that is allowing them to expanding their reach well beyond financial services to virtually every industry, everywhere.

The one-man SOC: Habits of highly effective security practitioners

Do you feel alone? No resources? No help? If you are like many security practitioners faced with a mountain of tasks each day and a small (or non-existent) team to help, prioritization and efficiency are key.