Hi [[ session.user.profile.firstName ]]

Kenna Security

  • Date
  • Rating
  • Views
  • How a Cybersecurity Executive Deals with Application Risk
    How a Cybersecurity Executive Deals with Application Risk Joe Silva, Vice President of Cybersecurity for TransUnion Recorded: May 16 2018 33 mins
    Join Kenna Security for a discussion on how cybersecurity executives can benefit from taking a risk-based approach to application security – from aligning your teams around common goals to reduce the most risk, to metrics-based reporting to the board. Joe Silva, Vice President of Cybersecurity for TransUnion will provide real-world examples to explain how to overcome the unique challenges to application security to help you gain control over your application risk posture.

    Joe encounters the same challenges that plague you – application security testing data with limited coverage of the application attack surface or riddled with false positives; manual application analysis that simply can’t scale; and security teams that know there is risk, but simply don’t have the time, expertise, or context to find and remediate the relatively small percentage that are high-risk. He also understands what it’s like to have a security team that must convince developers to deviate from their primary responsibility to remediate the vulnerabilities.
  • Reporting Risk Posture to the Board: Increase Confidence with Exploit Prediction
    Reporting Risk Posture to the Board: Increase Confidence with Exploit Prediction Jonathan Cran, Head of Research & Jerry Gamblin, Principal Security Engineer, at Kenna Security Recorded: Apr 24 2018 45 mins
    Reporting your organization's risk posture to the board shouldn't be a scary annual or quarterly monologue, where you're on the hot seat; instead, it should be an ongoing opportunity for bilateral communication that helps drive your security strategy. Fully understanding their perspectives, priorities, and biases paves the way for valuable partnership between security executives and members of the board.

    Join Kenna Security's Jonathan Cran, Head of Research, Jerry Gamblin, Principal Security Engineer, and Jeff Aboud, Director of Product Marketing for a live webinar as they discuss:

    1. Define what "just enough security" means to your business
    - Understand the resources and roadmap for the business
    - Ensure team members understand and buy into the priorities
    - Understand how to partner with your business executives

    2. Prioritize based on bottom line impact
    - Know which systems drive business value
    - Partner with the business and the board to drive prioritization
    - Build a risk burndown or "time to green" plan

    3. Report risk and manage incidents with the C-level and board
    - Define regular communication with your board
    - Partner cross-functionally with legal teams
    - Manage crisis communication and how to avoid going "end-of-the-world"
  • Kenna Platform Demo - A Better Way to Report on Risk
    Kenna Platform Demo - A Better Way to Report on Risk Security Engineer, Brian Orr, Security Consultant, Gabe Howden Recorded: Mar 28 2018 31 mins
    Are you implementing Qualys, Rapid7, Nessus, or another network scanner and still struggling to prioritize your most critical vulnerabilities? Are you searching for a simple, single view of your organization's exposure to risk that you can share across security and IT ops teams and up to the CISO and the Board of Directors?

    Join Security Engineer, Brian Orr and Security Consultant, Gabe Howden as they take you through the Kenna Security Platform and our risk-based approach so you can learn how to take control and reduce your risk.

    The demo will cover:

    - How Kenna Security's algorithm works to correlate scan data with real-world exploit intelligence
    - The Kenna Security Risk Meter and tips for customizing dashboards and reporting for any IT environment
    - Best practices for viewing, tracking, and reporting on your risk posture across all levels of your organization
  • A New Way of Predicting Exploitability - Kenna Security with Exploit Prediction
    A New Way of Predicting Exploitability - Kenna Security with Exploit Prediction Ed Bellis, CTO, Co-Founder, Michael Roytman, Chief Data Scientist Recorded: Mar 21 2018 41 mins
    Do you think security is overdue for actionable forecasts rather than security dogma? Are you a security leader tired of worrying about the next vulnerability with a logo and a web site? If we can forecast the weather, we can use similar models to foresee which vulnerabilities attackers are likely to weaponize.

    Join Kenna Security's Michael Roytman, Chief Data Scientist and Ed Bellis, CTO, Co-Founder and ex-CISO at Orbitz for a live webinar where they will debut Kenna Security's new Exploit Prediction, the industry's first vulnerability exploit prediction capability, a significant breakthrough for security professionals looking to develop a more mature proactive approach to vulnerability management.

    In this webinar cover:

    "How Kenna Exploit Prediction has delivered 94 percent predictive accuracy
    "How to adopt a proactive approach to contextualize, prioritize and remediate vulnerabilities, based on risk
    "How the Kenna Security Platform with Exploit Predictions can help align security, IT operations, and executive management with a single view of risk
    "A demonstration of the Kenna Security platform with the new Exploit Prediction capabilities
  • GDPR & Cyber Threat Forecasting: How to Predict and Prevent Attacks
    GDPR & Cyber Threat Forecasting: How to Predict and Prevent Attacks Ed Bellis, CTO & Co-founder of Kenna Security Recorded: Feb 22 2018 45 mins
    When GDPR comes into force in May 2018, many more breaches will become public knowledge, creating more work for already over-stretched security professionals. With each new breach, stakeholders will turn to their CISOs and security teams to ask to what degree their own business is at risk and to see evidence of how that risk is calculated. In this session, former Orbitz CISO & co-founder of Kenna Security, Ed Bellis, demonstrates how the utilization of AI is helping security teams to move from a reactive approach to managing vulnerabilities to a predictive, risk-based model that can rapidly scale across millions of assets.

    Join Ed as he shows:
    - How accurately predicting and reporting on risk measurably improves an organisation’s security posture.
    - How to dramatically reduce remediation time by prioritizing the most important fixes, based on real-world dynamic threat intelligence - 24 hours a day, 7 days a week.
    - How to align security, IT operations, and compliance with a single view of risk.

Embed in website or blog