Visualizing Risk - Measure Twice, Act Once

Visualizing Risk - Measure Twice, Act Once
Visualizing Risk - Measure Twice, Act Once
Visualizing Risk – Measure Twice, Act Once

Date: Wednesday, March 28th
Time: 11:00 a.m. PT/ 2:00 p.m. PT
Register: HERE

The challenge every security pro faces each morning is “what to do first?” Big picture planning, threat detection, refining operations and automating compliance clamor for attention every day. How to be most effective? By consistently making fact-based decisions, based on operations data, that reflect your organization's priorities.

Mountains of data - configurations, change information, vulnerabilities, network traffic – is collected daily in your infrastructure. But your team lacks both methods and tools to visualize and assess this relentless flood. So taking action that feels right can raise your risk posture, compromise policy compliance and halt business operations.

First Securosis' Mike Rothman will provide an overview of the issues and principles of fact-based network security and propose a philosophy to guide data-driven decisions. Remember that having metrics and using them effectively are totally different.

Jody Brazil will then introduce FireMon's new Risk Analyzer solution, which provides both security strategists and SOC teams with the real-time visibility and analysis needed to confidently take the most effective steps to reduce risk and improve security.

 
Featured speakers:
Jody Brazil, president and CTO, FireMon
Mike Rothman, analyst and president, Securosis

 
Sponsored by:

Sign up to our newsletters

More in Vendor Webcasts

Why NAC? Why now?

Why are so many enterprises rushing to implement network access control (NAC) now? Watch this webcast to learn about the many uses of NAC.

Security Based on Trust, Not Fear

Security Based on Trust, Not Fear

Trust is essential for building a sustainable business. Security is essential for building trust. To build that trust in electronic networks, security needs to be built into a suitable framework, ...

Unknown Targeted Attacks - Stopping malware at the endpoint

Unknown Targeted Attacks - Stopping malware at the ...

The threat of Targeted Persistent Attacks (TPAs) continues to grow and nearly every day there is another headline about an organization being breached and critical data stolen. Organizations must ask ...