Visit https://securityweekly.com/vicarius for more information!
It s not uncommon to find the traditional vulnerability assessment report buried under the CISO family picture, compliance books, and his latest blood pressure test. These reports highlight the never-ending battle between security and IT about what s more important: risks to servers and endpoints, or keeping the environment up-to-date and secured. There are even problems within the ranks of each unit. Dysfunctional processes, lack of efficient communication, and rudimentary tools put even more pressure on the CIO and CISO. This segment is sponsored by Vicarius.
Vulnerability Rich - Contextually Blind!
|[caption id="attachment_210" align="alignleft" width="120"] Jeff Man - Sr. InfoSec Consultant[/caption]||[caption id="attachment_210" align="alignleft" width="120"] Lee Neely - Senior Cyber Analyst[/caption]||[caption id="attachment_210" align="alignleft" width="120"] Paul Asadoorian - Founder & CTO[/caption]|
|[caption id="attachment_210" align="alignleft" width="120"] Michael Assraf - CEO & Co-Founder[/caption]|
Visit https://securityweekly.com/webcasts to see what we have coming up! Learn How to Create and Run a Conference, from some of the geniuses behind Layer8 Conference and Wild West Hackin Fest on August 19th! Our next technical training on August 27th will teach you about BootHole, SIGRed and SMBleed…Best Practices To Prioritize And Remediate Now! Or visit securityweekly.com/ondemand to view our previously recorded webcasts!