Training

Governance , Next-Generation Technologies & Secure Development

New Methods for Assessing and Mitigating Security Risk

New Methods for Assessing and Mitigating Security Risk

Today many organizations take an audit-oriented approach to network security. Businesses often rely on purchasing security products, meeting compliance standards and performing audits in order to gain insight into the security posture of themselves, their partners and suppliers. Yet these measures have proven to be insufficient, with recent breaches across multiple industries that have prompted executives to take notice of this challenge.

Join Stephen Boyer, CTO and Co-Founder of BitSight Technologies, and Dave Dalva, VP, Security Science at Stroz Friedberg, for this webinar to learn about new methods for assessing and mitigating security risk. You will learn how global organizations are using BitSight Security Ratings as part of a risk-based approach to benchmarking their own security risks, as well as managing third-party network risks.

Attendees will also learn:

  • The challenges of measuring security risk and the limitations of current assessment methods;
  • What data goes into a Security Rating and how it is calculated;
  • How some of America's leading companies are using Security Ratings to manage risk.

Background

One recent study found that information security risk is now the third biggest concern of CEOs and their senior executives. In order to effectively tackle the problem of security risk, businesses need new strategies and tools to continuously monitor networks and measure security outcomes. If companies could obtain information security ratings, similar to credit scores, it would give them expanded visibility into the constantly changing threat landscape, and support efforts to develop a standard metric to benchmark security performance.

Attendees of this webinar will also learn:

  • Why blind spots in current risk assessments can leave organizations vulnerable;
  • How benchmarking security performance can help organizations mitigate risk and focus resources;
  • The advantages to continuous monitoring of third party vendors, suppliers and partners.

Webinar Registration

Coming Soon

Request to be notified when this webinar is made available OnDemand.

Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.