Hi [[ session.user.profile.firstName ]]

Security Metrics That Matter: Improving Visibility and Effectiveness

Security metrics for improving management have long been an issue of discussion and debate across the industry. Some experts and practitioners contend that we need these key indicators if we’re ever going to drive down real-world risk, while others think that the concept can’t be applied practically
Security metrics for improving management have long been an issue of discussion and debate across the industry. Some experts and practitioners contend that we need these key indicators if we’re ever going to drive down real-world risk, while others think that the concept can’t be applied practically. Some experts feel that we just haven’t found the right numbers to measure security effectiveness yet.

Count RedSeal Networks among the final group… although we think that we’ve made some important headway in helping organizations unearth those figures that will actually allow them to better trend and improve their rates of success.

Expanding on his sold-out keynote at Security BSidesSD, join RedSeal CTO Dr. Mike Lloyd for a webcast: Security Metrics that Matter
As part of his presentation Dr. Mike will outline:

•Why previous metrics efforts have under-delivered
•The need to tie measurement to underlying business value
•How you can build metrics that truly measure effectiveness

As an added bonus, we’ll also release the results of our in-booth RSA survey: “Panning for Gold in the Avalanche: Security Pros Still Searching for Metrics”

Don’t miss this chance to hear this compelling new research that surfaces the opinions that you and your colleagues at RSA shared with us.

Hear about your peers’ current level of visibility into network access and risk exposure, the desire for new security metrics, and how RedSeal can help.
Recorded Apr 26 2012 56 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Dr. Mike Lloyd, CTO, RedSeal Networks
Presentation preview: Security Metrics That Matter: Improving Visibility and Effectiveness
Recommended for you:
  • Date
  • Rating
  • Views
  • Corporate Governance for CISOs: Board Presentations Corporate Governance for CISOs: Board Presentations Keyaan Williams, Senior Executive, C|CISO Programs at EC-Council Recorded: May 6 2016 47 mins
    Join Keyaan Williams, Senior Executive, C|CISO Programs at EC-Council for his Corporate Governance for CISOs webinar series! The second webinar in the series will cover the topic of Board Presentations from an IS executive perspective. This session focuses on reporting the right metrics to the right people. What metrics should the CISO collect? Where do these metrics exist? What are the best ways to present this information to the board of directors and other organizational leaders?
  • The Dangerous Misperception of Ransomware The Dangerous Misperception of Ransomware Harlan Carvey, Security Analysis Senior Consultant, SecureWorks Counter Threat Unit Research Team Recorded: May 5 2016 61 mins
    The proliferation of Ransomware has ushered in a new wave of extortionware and a new generation of malware attacks. While these types of attacks are not new, they have become more insidious and sophisticated, growing in popularity in concert with the expansion of electronic payment systems such as bitcoin. In April, the US and Canada both issued formal warnings and suggestions, but how much that is reported about this new malware is true? Are we being naïve in our efforts to block these Ransomware attacks?

    Attend this webcast to learn not only the truth behind Ransomware attacks, but also how to protect your organization utilizing a holistic and unifying visibility into your network and endpoints. Secureworks Security Analysis Senior Consultant, Harlan Carvey will answer vital questions about the nature of Ransomware and provide more insight into the actors, their methods, and their motivations:

    - What is Ransomware?
    - How does it proliferate?
    - How do I detect and block it?
    - How do I know what systems are compromised or how the attacker got in?
    - Do I pay the ransom if I am attacked?
    - How do I ensure that I don’t become a victim (again)?
  • Cloud data warehouses: Why simple is better Cloud data warehouses: Why simple is better Evan Schuman, VentureBeat Recorded: May 5 2016 61 mins
    The first rule of data analytics for fast-growing companies? Measure all things. When putting in place a robust data analytics strategy to go from measurement to insight, you’ve got lots of options for tools -- from databases and data warehouse options to new “big data” tools such as Hadoop, Spark, and their related components. But tools are nothing if you don’t know how to put them to use.

    We’re going to get some real talk from practitioners in the trenches and learn how people are bringing together new big data technologies in the cloud to deliver a truly world class data analytics solution. One such practitioner is Celtra, a fast-growing provider of creative technology for data-driven digital display advertising. We’re going to sit down with the Director of Engineering, Analytics at Celtra to learn how they built a high-performance data processing pipeline using Spark + a cloud data warehouse, enabling them to process over 2 billion analytics events per day in support of dashboards, applications, and ad hoc analytics.

    In this webinar you’ll:

    * Build a simpler, faster solution to support your data analytics
    * Support diverse reporting and ad hoc analytics in one system
    * Take advantage of the cloud for flexibility, scaling, and simplicity

    Speakers:

    * Evan Schuman, Moderator, VentureBeat
    * Grega Kešpret, Director of Engineering, Analytics, Celtra
    * Jon Bock, VP of Marketing and Products, Snowflake

    Register today and learn how the top SaaS strategies can streamline your business.

    Sponsored by Snowflake
  • SVN & Git High Availability - Part 1 SVN & Git High Availability - Part 1 Doug Robinson Recorded: May 5 2016 63 mins
    What does “high availability” mean in practical terms?

    Join us for a free two part webinar detailing what it takes to make your Subversion or Git deployment highly available, including some of the trade-offs to expect.

    If you’ve got questions, this webinar is your chance to get answers from our Senior Product Manager and resident expert Doug Robinson.
  • Scary Facts About Online Security Scary Facts About Online Security Tricia Pattee, HOSTING Director of Managed Services Recorded: May 5 2016 29 mins
    As the Internet of Things encourages businesses to embrace big data, IT professionals turn to online resources to house and manage applications. However, cyber attacks are increasingly becoming a matter of “when,” not “if,” leading IT professionals to seek robust security solutions. Still on the fence about whether your small to medium sized enterprise really needs that much protection? Join Tricia Pattee, Product Manager at HOSTING, for a 30 minute webinar about scary facts about online security you need to know. Bring your questions – we’ll host a Q&A at the end of the presentation.
  • Securing the Foundation to Secure the Cloud Securing the Foundation to Secure the Cloud J. Trent Adams, Director of Ecosystem Security, PayPal Recorded: May 5 2016 42 mins
    Secure clouds don't exist in a vacuum. The very nature of a secure cloud relies on effective standardized, interoperable, and scalable Internet security. As the cloud metaphor displaces the concept of proprietary point-to-point networked servers, the key to its value can be found in the interoperability of service protocols. Securing these connections requires understanding and deploying standards such as TLS HSTS, CT, CSP, DMARC, and FIDO. Each protocol addresses specific security concerns encountered when you extend your security perimeter to include external cloud services. Developing and deploying technologies like these requires a holistic view of the security landscape, and working within a robust Internet security ecosystem.

    Key Talking Points:

    - Cloud security relies on standardized Internet security protocols.

    - Developing Internet security protocols requires multistakeholder involvement.

    - Key areas of focus include securing: transport, content, communication, and authentication.

    - Case studies presented in developing CT, CSP, DMARC, FIDO, and TLS 1.3

    - Internet security is constantly evolving; adapt or perish.
  • Data, the new oil: Find out why and what it means for your organization Data, the new oil: Find out why and what it means for your organization Moderator: Adrian Davis, (ISC)² EMEA; Speaker: Jason Hart, IDP CTO, Gemalto Recorded: May 5 2016 62 mins
    Every day, we create 2.5 quintillion bytes of data — so much that 90% of the data in the world today has been created in the last two years alone.
    More data in more places is leading to an increasing number of data breaches with attackers intent on trying to monetize your sensitive information.
    Jason Hart, IDP CTO at Gemalto will explain why data is the new oil and how easy it is to get hacked with a live hacking demo.
    In this interactive webinar we will also discuss:
    - Why your data is wanted
    - The new data Protection paradigm
    - Live Hacking demo
    - What’s next and what to do now to remain on the safe side

    Join the webinar to find out what you should know about Data Protection, how Cloud, IOT and big data impact your information security solutions and to how to keep your data safe.
  • Data, the new oil: Find out why and what it means for your organization Data, the new oil: Find out why and what it means for your organization Moderator: Adrian Davis, (ISC)² EMEA; Speaker: Jason Hart, IDP CTO, Gemalto Recorded: May 5 2016 62 mins
    Every day, we create 2.5 quintillion bytes of data — so much that 90% of the data in the world today has been created in the last two years alone.
    More data in more places is leading to an increasing number of data breaches with attackers intent on trying to monetize your sensitive information.
    Jason Hart, IDP CTO at Gemalto will explain why data is the new oil and how easy it is to get hacked with a live hacking demo.
    In this interactive webinar we will also discuss:
    - Why your data is wanted
    - The new data Protection paradigm
    - Live Hacking demo
    - What’s next and what to do now to remain on the safe side

    Join the webinar to find out what you should know about Data Protection, how Cloud, IOT and big data impact your information security solutions and to how to keep your data safe.
  • PCI and Vulnerability Assessments - What’s Missing? PCI and Vulnerability Assessments - What’s Missing? Mike Pittenger, VP of Security Strategy, Black Duck Recorded: May 4 2016 36 mins
    All regulatory requirements (HIPAA, PCI, etc.) include a mandate for assessing vulnerabilities in systems that manage or store sensitive data. Organizations often opt to conduct vulnerability assessments on an annual, quarterly, or even monthly basis. But while vulnerability assessment tools can identify unpatched or misconfigured code bases, these tools overlook a large portion of an organization’s attack surface: known vulnerabilities in applications that are built in-house. These applications will not have public updates, nor will the thousands of open source components they utilize be included in public disclosures. This is concerning because over 6,000 vulnerabilities in open source projects have been reported since 2014. Register for this webinar to discover how to protect yourself.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Security Metrics That Matter: Improving Visibility and Effectiveness
  • Live at: Apr 26 2012 10:00 pm
  • Presented by: Dr. Mike Lloyd, CTO, RedSeal Networks
  • From:
Your email has been sent.
or close
You must be logged in to email this