Hi [[ session.user.profile.firstName ]]

BitSight Security Ratings

  • Date
  • Rating
  • Views
  • Impact of NotPetya & Top Recommendations for Defending Against the Next Big One
    Impact of NotPetya & Top Recommendations for Defending Against the Next Big One Greg Bell (Corelight), Stephen Boyer (BitSight), Michael Landewe (Avanan), Brian Robison (Cylance) Recorded: Jul 13 2017 62 mins
    In the aftermath of the recent NotPetya/ExPetr cyber attack that spread across Europe, Asia and the US in June, what are the lessons for enterprises and organizations? How should we improve our critical data security in an age of high-frequency and high-impact cyber attacks?

    Join this interactive Q&A panel session with security experts from Cylance, Corelight and BitSight as they discuss:
    - Trends in cyber attacks: NotPetya / Wannacry
    - The short-term and long-term impact
    - Tips for organizations on how to improve their security posture
    - Steps to take today and insights to guide your long-term security strategy

    Speakers:
    - Greg Bell, CEO of Corelight
    - Stephen Boyer, CTO & Co-founder of BitSight
    - Michael Landewe, Co-Founder of Avanan Cloud Security

    Moderator:
    - Brian Robison, Sr. Director of Technical Marketing, Cylance
  • A Growing Risk Ignored: Exploring the Risks & Pitfalls of Outdated Systems
    A Growing Risk Ignored: Exploring the Risks & Pitfalls of Outdated Systems Dan Dahlberg, BitSight Recorded: Jul 12 2017 40 mins
    This past May, over 300,000 computers in over 150 countries were affected by the WannaCry ransomware attacks. Despite an available patch from Microsoft, many of the companies failed to install critical updates prior to the attack-- leaving them vulnerable. Thousands of machines were infected and the worm caused network outages, flight cancellations, and ATM failures. Given the increasing number of endpoint devices connected to corporate networks, the ever- expanding supply chain, and the complexity of cyber attacks, are companies adequately updating their operating systems? In this webinar, BitSight Data Scientist Dan Dahlberg will discuss:

    -BitSight’s own research on outdated endpoints and their correlation to the May 2017 WannaCry attacks

    -The risk of running outdated systems on your business’ bottom line

    -The risks organizations face if companies in their supply chain are not keeping up with their patching process
  • Ransomware & Other Cybersecurity Trends In Major Industries
    Ransomware & Other Cybersecurity Trends In Major Industries Jay Jacobs, Joel Alcon: BitSight Recorded: May 31 2017 36 mins
    Large-scale data breaches continue to hit all industries, leading to millions of compromised records. According to the Identity Theft Resource Center, there were 780 data breaches in which nearly 178 million records were compromised. While no industry is immune to data breaches, some are more prepared than others.

    Join Jay Jacobs, Senior Data Scientist at BitSight as he explains how security posture differs in six major industries. This webinar will highlight new findings on:

    - The most common ransomware infections
    - The rate of ransomware infections found across major industries
    - The aggregate BitSight Security Rating for each industry
  • Reputation Matters: Keeping Your Brand Strong in the Age of Cyber Risk
    Reputation Matters: Keeping Your Brand Strong in the Age of Cyber Risk Jake Olcott, VP of Business Development, BitSight; Siobhan Gorman, Brunswick Group; John Fiore, Former CIO, BNY Mellon Recorded: May 23 2017 61 mins
    In today's world, a cybersecurity incident can quickly become a risk to an organization's reputation. Reputational risk management is a critical business practice to ensure that your organization is doing everything possible to minimize the potential damage to its character or value.

    Join our panelists Jake Olcott, VP of Business Development at BitSight, Siobhan Gorman, Director at Brunswick Group, and John Fiore, Former CIO of BNY Mellon as they discuss:

    - How to mitigate reputational risk through cybersecurity risk management
    - Ways in which reputational risk can affect your company's bottom line
    - What executive leaders and board members care most about in regard to reputational risk
    - Examples of successful and unsuccessful reputational risk management
    - How security officials should be thinking about reputational risk management in their data security initiatives
  • Are Common Business Partners Putting You At Risk?
    Are Common Business Partners Putting You At Risk? Jay Jacobs, Senior Data Scientist, BitSight Technologies Recorded: Apr 18 2017 28 mins
    BitSight researchers recently studied the security performance of Fortune 1000 companies alongside a random sample of companies with a similar industry breakdown. How did they compare, and what should organizations take away from the study?

    Join Jay Jacobs, Senior Data Scientist at BitSight to learn about the security strengths and weaknesses found within Fortune 1000 companies. In this webinar, you’ll learn:

    - How the security hygiene of Fortune 1000 companies compare to similar counterparts
    - Why Fortune 1000 companies disclose nearly twice the amount of data breaches as other companies
    - Common machine comprises found in Fortune 1000 companies
    - What all businesses can take away as a result

    Register today and get a copy of the report upon attending the webinar!
  • How to Approach Portfolio Risk Aggregation
    How to Approach Portfolio Risk Aggregation Samit Shah Recorded: Mar 29 2017 38 mins
    Join us on Wednesday, March 29th has Samit Shah, BitSight's Insurance Solutions Manager discusses how cyber insurers should approach portfolio risk aggregation and how other businesses can use this mindset to decrease risk across their portfolio of vendors.
  • 3 Ways to Improve Your Security Performance This Year
    3 Ways to Improve Your Security Performance This Year Julia Grunewald, Senior Customer Success Manager, BitSight Technologies Recorded: Mar 9 2017 24 mins
    With new cyber attacks and data breaches emerging on a daily basis, today’s organizations need a deeper understanding of the security performance of their programs, policies, and third parties. That’s why many companies use security ratings to help measure and mitigate cyber risk across their business ecosystems.

    Join this talk to learn how you can improve your organization’s security rating by improving your overall security posture.

    In this webinar, you’ll learn:

    - Three ways to improve your security performance in 2017
    - What impact these changes could have on your Security Rating
    - How to use BitSight Security Ratings to prioritize the remediation of security events and issues
  • How to Mitigate Cyber Risk with Efficient Vendor Risk Management
    How to Mitigate Cyber Risk with Efficient Vendor Risk Management Kevin Roden and Julia Grunewald Recorded: Feb 22 2017 42 mins
    Over the past few years, outsourcing business functions to vendors has been on the rise. In fact, there are more third-party relationships today than ever before. However, as the number of supplier relationships grows, so grows the amount of risk those suppliers pose. And in today’s hyper-connected landscape, cyber risk has taken center stage when it comes to vendor risk.

    Join former CIO, Kevin Roden, and BitSight’s Senior Customer Success Manager, Julia Grunewald, on Wednesday, February 22nd at 1pm ET, as they discuss traditional and emerging vendor risk management (VRM) tactics.

    In this webinar you’ll learn:
    - How VRM has traditionally been handled
    - Why traditional strategies alone aren’t enough
    - Advice on how to effectively and efficiently mitigate cyber risk
  • A CIO's Guide to Benchmarking Cybersecurity Performance
    A CIO's Guide to Benchmarking Cybersecurity Performance Jake Olcott, VP of Business Development, BitSight, Tom Stumpek, Technology Advisor and former CIO of GE Recorded: Feb 9 2017 61 mins
    In order for a business to be competitive, it must be continuously improving. This is something the modern chief information officer (CIO) knows all too well. Further, technological advances and greater outsourcing in business have made cyber risk a key area that requires a great deal of thought from the CIO. So, how can CIOs know how their security programs are performing in order to make decisions on allocating funding, headcount, and policies?

    Join Jake Olcott. VP of Business Development at BitSight and Tom Stumpek, a Technology Advisor and former CIO for GE. Attendees will learn:

    - Why cybersecurity benchmarking is difficult for the modern CIO
    - Different methods of benchmarking you may be involved in (or want to consider)
    - How Security Ratings may solve many benchmarking challenges
  • Presenting Cybersecurity to the Board: Your How-to for Success
    Presenting Cybersecurity to the Board: Your How-to for Success Richard Clarke, Jasper Osstenjuk, Jake Olcott Recorded: Jan 25 2017 62 mins
    Today, cybersecurity is a #1 concern for board members. But what do they need to know? And how should it be presented?

    Richard Clarke has a pretty good idea. As a senior White House advisor to four U.S. Presidents, a member of three corporate boards, and CEO of Good Harbor Security Risk Management, he’s talked cybersecurity in both the Situation Room and the boardroom.

    Jasper Ossentjuk also knows how to present cybersecurity in the boardroom. As SVP and CISO for TransUnion, Jasper regularly presents information to his Board about his organization's security posture.

    On January 25th at 1:00PM ET, join Richard and Jasper for a discussion of:

    - What cybersecurity metrics and measurements are most important for the board
    - Methods for security leaders to communicate security issues across the enterprise
    - How to graphically represent your cybersecurity program

Embed in website or blog