Featured
Attack Surface Management with an Attacker’s and Defender’s View
Kunal Modasiya VP, Product Management, Attack Surface Management & AppSec, Qualys
Gain crucial insights into building a successful Attack Surface Management (ASM) project to safeguard your internet-exposed assets from cyber attackers. Through impactful use cases, learn about the key elements and strategies that will help fortify your security defenses.
All episodes
-
Navigating Risk in an Era of Expanding Attack Surfaces
Jonathan Trull CISO & SVP, Security, Solution Architecture, Qualys
Join us as we delve into the pressing issue of growing attack surfaces and the need for organizations to address the associated risks. In an era of digitalization, cloud adoption, and interconnected systems, the entry points for threat actors are multiplying, and attackers are more adept at swiftly exploiting organizations’ defenses. Discover how security leaders can go beyond traditional methods to manage and reduce risk.
-
Attack Surface Management Matters
Jon Oltsik Distinguished Analyst and Fellow, Enterprise Strategy Group
Attack Surface Management (ASM) has gained attention over the past few years, driven by digital transformation initiatives, cloud computing adoption, a remote workforce, and a dangerous threat landscape. Despite this attention, there’s still confusion about what ASM is, why it matters, and how organizations should approach it. In this session, Jon will help security professionals answer these questions and share trends and insights from ESG research.
-
Defining the Attack Surface: A CISO’s Perspective
Jonathan Trull CISO & SVP, Security, Solution Architecture, Qualys and Ryan Barrett CISO, Intermedia
Join us for an insightful discussion featuring Qualys CISO, Jonathan Trull, and Intermedia CISO, Ryan Barrett. Together, they will explore the challenges posed by the expanding attack surface and provide valuable insights and strategies to safeguard your organization’s digital assets. Don’t miss this opportunity to enhance your security defenses.
-
Fireside Chat: ASM & the Zero-Trust Connection
Bill Reed, Product Marketing Expert Qualys and Art Thompson CIO, City of Detroit
Explore the challenges and risks organizations face in adopting Zero Trust policies without proper asset visibility. Bill and Art will share best practices and learn how external attack surface management is crucial for effective Zero Trust strategies.
-
The CISO Maturity Model: Building a Cyber Strategy
Mike Orosz VP Information and Product Security Vertiv Inc
Today, CISOs are more central to an organization’s strategy than ever. Attackers have grown more sophisticated, breaches have become more expensive, and the attack surfaces organizations must defend have expanded.
The average Chief Information Security Officer (CISO) now assumes a heightened position, as they are responsible for shaping, validating, and communicating the risk exposure of their entire organization to the senior executives and board of directors. However, considering this expanded role, have the tools accessible to most CISOs adapted to their increased level of responsibility? What are the most critical considerations when building a cyber risk management strategy to meet the demands of an anxious boardroom? Lastly, can success be measured in a way that supports the CISOs’ cyber risk evolution?
Join Mike Orosz, the Global Chief Information and Product Security Officer of Vertiv, as he answers these questions and more. In this 30-minute keynote, Mike will share what methods and metrics have made Vertiv’s cyber risk strategy scale to secure a business with operations in more than 130 countries.
-
Attack Surface Management with an Attacker’s and Defender’s View
Kunal Modasiya VP, Product Management, Attack Surface Management & AppSec, Qualys
Gain crucial insights into building a successful Attack Surface Management (ASM) project to safeguard your internet-exposed assets from cyber attackers. Through impactful use cases, learn about the key elements and strategies that will help fortify your security defenses.