Hi [[ session.user.profile.firstName ]]

RiskSense

  • Date
  • Rating
  • Views
  • Balancing Cybersecurity Risk for the State of Arizona
    Balancing Cybersecurity Risk for the State of Arizona
    Morgan Reed and John Dasher Recorded: Mar 19 2019 58 mins
    In this webinar, we’re joined by Morgan Reed, Chief Information Officer for the State of Arizona. Morgan’s extensive experience in both private enterprise and the public sector puts him in a unique position to help us understand and benefit from how cybersecurity risk is being measured and controlled at the State of Arizona. We’ll discuss relevant cybersecurity risk topics, including his environment, how he views and communicates cybersecurity risk, some frameworks, and how you can go about applying his experience to your own environment, regardless of sector or vertical industry.
  • Leveraging a Risk-Based Approach to Vulnerability Management
    Leveraging a Risk-Based Approach to Vulnerability Management
    Maxine Holt and Jason Farmer Recorded: Feb 27 2019 43 mins
    Hear from security industry expert from Ovum on moving from silos to collaboration across security and IT teams. For years organizations have leveraged traditional Key Performance Indicators (KPIs) to define success in their Vulnerability Management programs. Unfortunately, this often pitts the security team, who drives the assignment of work, against the overloaded operations team, who performs the work, against one another. The transition to a risk-based approach offers many benefits including more effective communications, a shared understanding of priorities, and a unified sense of purpose. These benefits enable security and operations teams to truly work together to improve the effectiveness of your Vulnerability Management program.
  • Convergence of Cybersecurity and Fraud
    Convergence of Cybersecurity and Fraud
    Dr. Srinivas Mukkamala, CEO & Co-Founder of RiskSense Recorded: Jan 23 2019 47 mins
    In most cases fraud, risk, and information security functions often only interact in the aftermath of a breach, and security and fraud point solutions typically remain isolated. With maturity in data pipelines, availability of shared data sets across risk, fraud, and information security, AI can be effectively used to detect anomalies and be predictive.

    In this webinar, Dr. Srinivas Mukkamala, a recognized expert on AI and neural networks, will discuss how a risk-based approach can facilitate the convergence of cybersecurity and fraud.
  • Continuous & Adaptable Security Models will Prevail
    Continuous & Adaptable Security Models will Prevail
    Dr. Srinivas Mukkamala, CEO & Co-Founder of RiskSense Recorded: Dec 13 2018 49 mins
    Dr. Srinivas Mukkamala will share his views on the most dramatic security threats that will draw more attention in 2019. He will identify why new technologies will begin creating an even more porous and vulnerable IT infrastructure. Consider:

    - AI might be your friend but it also powers your foes
    - Robotic Process Automation (RPA) another crack in your attack surface
    - DevOps Automation tools as targets for administrative controls and chaos
    - API Keys becoming the keys to the kingdom

    There is hope and Dr. Mukkamala will illustrate how organizations can have improved visibility, detection, remediation, and response when dealing with growing reliance on these technologies in 2019 and beyond.
  • Risk is a Board Game - Navigating Board Conversations on Cybersecurity Risk
    Risk is a Board Game - Navigating Board Conversations on Cybersecurity Risk
    Ed Amoroso and John Dasher Recorded: Nov 13 2018 61 mins
    You’ve gotten what you wished for. Cybersecurity and cyber risk are now board-level issues. Whatever barriers that once existed between business and security have disappeared, and your board is expecting a meaningful conversation on the topic. After all, board members can be held personally liable for business disruptions caused by security issues. Depending on how often these conversations occur, it’s probably safe to assume that the board has a) forgotten what you told them in the last meeting, and, b) wishes you framed your reporting in more of a business context, especially if they don’t have an IT or security background.

    In this webinar, we’ll be chatting with Ed Amoroso, former CISO for AT&T and founder and CEO of TAG Cyber. Ed’s extensive experience interacting with board members and recent publications on the topic will serve as the backdrop for walking through a few of his favorite questions that board members should be asking you about cybersecurity risk, and how you can go about providing answers that matter.
  • Getting Off the Threat & Vulnerability Management Treadmill
    Getting Off the Threat & Vulnerability Management Treadmill
    John Dasher Recorded: Nov 9 2018 22 mins
    Organizations “know” what they need to do. They scan, find piles of vulnerabilities, then rush to patch. But low and behold, they aren't sure that their patching efforts are improving their security posture, and with patch tickets accumulating at an alarming rate, they fall further and further behind. Why? What’s wrong?

    Unfortunately, Security and IT teams often find themselves in this unenviable position. The good news is that there’s a movement afoot that can rescue them. In this session you will learn how a risk-based approach to vulnerability management reduces vulnerability fatigue while improving workflow efficiency and personnel productivity in a truly measurable way.
  • Taming the Security Data Tsunami
    Taming the Security Data Tsunami
    Kristy Zyburo Recorded: Oct 26 2018 20 mins
    Today's security and IT teams are suffocating under an avalanche of security data. The sheer volume of the data, along with its multiple origins in siloed systems all but guarantee that it lacks context, meaning, and is difficult to make actionable.

    Learn how RiskSense harnesses the vulnerability data you have, adds context with threat intel, and incorporates business asset criticality as well as pen test findings to tame your security data tsunami.
  • Predictive Intelligence: Vulnerability Weaponization and Exploitation
    Predictive Intelligence: Vulnerability Weaponization and Exploitation
    Dr. Srinivas Mukkamala, Co-Founder and CEO of RiskSense Recorded: Sep 18 2018 43 mins
    The key to effectively reducing the attack surface is remediating exactly the right vulnerability or weakness that will be used by the adversary. While the idea is simple enough, executing on it has proven to be one of the largest challenges facing enterprises.

    The impact of this lack of visibility into the attacker journey is that vulnerability remediation strategies are likely unaligned, and therefore ineffective.

    There’s no data that supports the hypothesis to align early weaponization to breaches, which makes it hard to know when it is the ideal time to fix the vulnerability or weakness.

    Vulnerability prioritization and weaponization prediction must be fueled with data and domain expertise. Fixing thousands of vulnerabilities is not enough. We need to make sure we are fixing the right vulnerabilities, at the right time. In this talk we will cover:

    • Quantitative and Qualitative: details on RiskSense threat dataset and data sources that allows us to uniquely separate “signal” from “noise”.
    • Unprecedented visibility into attack validation data: from over 10+ years, this enables us to reconstruct the complete attacker journey and understand time-based patterns.
    • Insights into Vulnerability life cycle: weaponization and breach latency. This will allow us to determine no engagement vs. engagement from a remediation standpoint.
    • Attributes and variables: used for Machine Learning to predict Weaponization and Breach Susceptibility

    This presentation will be given by Dr. Srinivas Mukkamala, Co-Founder and CEO of RiskSense. RiskSense’s team was the first to predict WannaCry and has since released Koadic Post Exploitation Command & Control.
  • Top 10 Tips for Selecting a Threat and Vulnerability Management Solution
    Top 10 Tips for Selecting a Threat and Vulnerability Management Solution
    David Monahan (EMA) and John Dasher (RiskSense) Recorded: Aug 31 2018 61 mins
    With all the news about cyberattacks, it’s easy to feel like there aren’t enough people to cover all of the security bases. This means proper identification and management of threats and vulnerabilities is an absolute necessity to keep risk at its lowest levels.

    Join David Monahan, managing research director at leading IT analyst firm Enterprise Management Associates (EMA), and John Dasher of RiskSense, to learn why a threat and vulnerability management solution is a must have for your security portfolio.

    During this webinar you will learn:
    - How threat and vulnerability management solutions with prioritization improve security operations efficiency
    - How to use a threat and vulnerability management and prioritization solution to garner greater support for security and improve security operations and business management alignment
    - The top 10 criteria you need to consider when selecting a solution
    - How to maintain a risk-based security management program
  • Piecing Together IoT Risk from Flexible & Fractured Design Components
    Piecing Together IoT Risk from Flexible & Fractured Design Components
    Dr. Srinivas Mukkamala, CEO and Co-Founder, at RiskSense Recorded: Jun 12 2018 47 mins
    How do you handle risk assessment and vulnerability management for IoT when multiple security patterns need assessment? There is a new frontier for security that requires breaking conventional control and mitigation assumptions before a Frankenmonster rises from your IoT project.

    In this webinar, RiskSense CEO and Co-Founder Dr. Srinivas Mukkamala will discuss:

    - The assessment of chaining together multiple vulnerabilities and the potential exploit path through flexible and fractured design components for IoT.
    - Consideration for dynamically changing devices and utilization models that break traditional security and risk assessments.
    - IoT risk and the growing need to incorporate threat data, unintentional device use-cases, and the mechanisms to keep constant control of the devices themselves.

Embed in website or blog