Browse communities
Browse communities
Presenting a webinar?

Security Ratings: A Big Data Approach to Measuring and Mitigating Security Risk

Stephen Boyer of BitSight Technologies and Oliver Brew of Liberty International Underwriters
The increasing volume of breaches we hear about in the news highlights the challenge risk managers face in working to address cyber risk. Current assessment methods, while insightful, are inadequate due to the pace at which security postures change, leaving organizations vulnerable and exposed in the blink of an eye. In order to truly reduce security risk, managers need more insight and better tools that allow for continuous visibility into the ever-changing network environments they are administering.

Join Stephen Boyer, CTO and co-founder of BitSight Technologies, and Oliver Brew, Vice President of Professional Liability at Liberty International Underwriters (LIU) for this webinar to discover:

- Why measuring security risk is difficult and how some assessment methods leave organizations vulnerable to threats and financial loss

- How forward-looking organizations are using Big Data to reduce risk, increase transparency and address new regulatory requirements

- Case Study: How LIU is using Security Ratings to mitigate risk
Apr 17 2014
46 mins
Security Ratings: A Big Data Approach to Measuring and Mitigating Security Risk
More from this community:

IT Security

  • Live and recorded (5381)
  • Upcoming (116)
  • Date
  • Rating
  • Views
  • In this webcast we will look at how to effectively manage Macs in the enterprise as well as mobile devices leveraging your existing IT infrastructure.

    The growth of Mac in the enterprise is undeniable. Apple’s success with the iPhone and iPad is bleeding over into end user preference for laptops. Where Macs used to account for only low single digit percentages of devices deployed and were therefore largely ignored, they are now growing across all verticals and industries and represent a significant challenge for IT.
  • Unfortunately, there is a high likelihood that organizations will suffer a breach by advanced malware. Learn how to minimize response time through real-time forensics to understand the scope of compromise including:

    - Identifying attacked endpoints
    - Finding indicators of compromise
    - Analyzing malicious activity
    - Tracing outbound communication, and more
  • Unfortunately, there is a high likelihood that organizations will suffer a breach by advanced malware. Learn how to minimize response time through real-time forensics to understand the scope of compromise including:

    - Identifying attacked endpoints
    - Finding indicators of compromise
    - Analyzing malicious activity
    - Tracing outbound communication, and more
  • Practice Makes Perfect When Defending Against DDoS Attacks

    DDoS attacks have been on the rise, especially hard-to-detect Layer 7 attacks that take down websites via resource exhaustion. Take the guesswork out of defending against these attacks by validating your DDoS defense effectiveness using realistic scenarios of real-world users and attacker behavior at scale.

    In this webinar, we will analyze and discuss the techniques and technology necessary to validate defenses against DDoS attacks:
    • Take a deep dive into multi-vector DoS attack strategies
    • Learn how to attack yourself in a controlled, safe environment
    • Create a DDoS Range to test your network defenses, personnel, and incident playbook

    Register now to reserve your spot.
  • Did you know the average breach goes undetected for 229 days? The earlier you can detect and respond to a breach, the faster you lower the risk and potential damage. Traditionally, companies have implemented a number of point solutions to for each new threat, an expensive and cumbersome approach. However, by combining threat protection from Fortinet with threat detection and response from AlienVault, companies now have an affordable way to significantly reduce the cost and complexity of complete threat management.

    Join threat experts from AlienVault and Fortinet for this webcast to learn how this integrated solution will provide:

    · Continuous threat prevention, detection and remediation in an easy-to-use solution

    · The ability to identify all critical assets and the potential attack surfaces in your network

    · Advanced analysis of FortiGate logs for threat identification and response through AlienVault USM

    · Simplified protection of your network with ONLY two products, at a price you can afford

    · Continual improvement of your security posture through frequent assessment.

    · Integrated threat intelligence that maximizes the efficiency of your security monitoring program
  • As organisations accept that they are more than likely to be breached, strengthening business resilience and response capabilities is becoming just as important as developing defensive strategies. As a result, organisations are crafting risk-based approaches to balance their priorities in order to protect, detect, respond and recover.

    Drawing on the findings of the Infosecurity Europe Industry Survey, this panel of industry experts will discuss the challenges for information security practitioners and how to prioritise and balance risk. The speakers will share insight into how to develop an information security strategy that protects the organisation’s information assets, whilst ensuring it is resilient and capable of responding robustly to incidents.
  • Companies rely heavily on networked technology today to operate their businesses. Highly distributed organizations like restaurant chains, retail stores, financial services or supply chain companies have an extra layer of difficulty. Rarely does each of the remote locations have IT expertise on site. As an IT manager, you are demanded by your executive management to keep the network available 100% of the time, avoid security breaches, support all the new strategic marketing initiatives and to do all of this with less money than you had in your budget last year! This session will review the top 5 challenges an IT manager in this situation needs to consider and suggest solutions:

    1) Executive mandate to "Do more with less"
    - Free-up your time to do what you do best
    - Vendor consolidation
    - Outsource, focus Internal resources on strategic tasks

    2) Lack of IT Expertise at remote sites
    - Consistency of deployment, Office in a box
    - How to make sure all locations have the same technology
    - Preplanned for growth and new services

    3) Sometimes lack of ownership of remote sites (Franchises)

    4) Security compliance/PCI DSS

    5) High availability
    - Network is down, business has stopped (can't take payments)
  • Join us to hear Africa Director Hendrik Malan and guest speaker Grant Theis, CEO of ttrumpet, as they discuss the emergence of Over-the-Top (OTT) providers and the potential opportunities for growth in the enterprise market.
  • Wie Sie in drei Schritten ein klares IT-Configuration Management aufsetzen

    Als Verantwortlicher für IT-Security sind Sie konstant mit möglichen Angriffszenarien und deren Abwehr beschäftigt. Ein Großteil der Angriffe sind nur deshalb erfolgreich, weil Komponenten in Ihrem Netzwerk unzureichend konfiguriert sind.
    Die Herausforderung ist, genau diese Maschinen zu identifizieren und sicher zu stellen, dass sie korrekt konfiguriert werden und dies auch bleiben.
    Lernen Sie in unserm Webcast wie Qualys Policy Compliance Ihr IT-Configuration-Management verbessern kann und damit Ihre Basis-Security stärkt und das Ganze voll automatisiert.
    Erfahren Sie:
    • Etablieren und Umsetzung von Security Configurations
    • Automatisierung und Durchführung von regelmäßigen Configuration Assessments
    • Priorisierung und Umsetzung von Remedation Workflows
  • Vous souhaitez en finir avec l’information dispersée à travers des centaines de répertoires partagés, espaces personnels, et disques durs locaux ?

    Vous êtes à la recherche d’une plateforme collaborative tout-en-un ?

    Vous êtes certainement déjà familier avec Microsoft SharePoint, mais êtes-vous sur de connaître l’étendue de son périmètre fonctionnel ?

    Car si SharePoint reste une excellente plate-forme intranet, de portail web, de collaboration et de partage documentaire, SharePoint va bien au-delà de ces fonctions avec le réseau social (RSE), les outils de développement, et la gestion documentaire (de type GED).

    Participez à notre webinar pour mieux comprendre la richesse de la plateforme et ses bénéfices : une collaboration unifiée et des gains de productivité à chaque niveau de l’entreprise (utilisateurs métiers, DSI, direction).

    Nous aborderons également les modèles de déploiement de SharePoint (100 % cloud, hybride ou on-premises) ainsi que les limites et bénéfices de chaque configuration.

    Dans un second temps, nous nous pencherons sur les questions de déploiement de SharePoint et nous découvrirons comment AvePoint, avec sa solution de migration pour SharePoint 2013 & Office 365, vous permet d’accélérer la mise en place de votre plateforme.

    Nous ferons un tour d’horizon des problèmes les plus communément rencontrés pendant les projets de migration, et nous verrons en 3 points comment AvePoint vous permet notamment de les adresser :

    • Optimisation des ressources dédiées à la migration en automatisant la suppression du contenu obsolète

    • Réduction de la perturbation des activités pendant le processus de migration grâce à une planification personnalisée.

    • Maintien de l’ensemble du contenu, des permissions et des métadonnées jugés pertinents par vos équipes.
  • Channel
  • Channel profile
  • Beware the Botnets: Botnets as an Indicator of Breach Likelihood Apr 28 2015 4:00 pm UTC 45 mins
    Stephen Boyer, Co-Founder adn CTO , BitSight
    A 2015 PwC survey found that 96% of CEO’s in the US have indicated rising concern about data breaches - and rightly so. With the record-breaking breaches of 2014 barely behind us, organizations want to take steps to avoid becoming the next victim and are looking for signs that can indicate troubling performance. BitSight Technologies may have found one such indicator. Using their Security Ratings data, recent research shows a solid correlation between a company’s botnet grade and their likelihood of experiencing a publicly disclosed breach, demonstrating that Security Ratings are a powerful metric for communicating cyber risk across the enterprise.

    Join BitSight CTO and Cofounder Stephen Boyer to discuss this research and to learn why continuous security performance monitoring should be an essential part of your enterprise risk management strategy.

    Attendees will learn:
    -What is the correlation between botnet grades and publicly disclosed breaches
    -Why botnet grades vary across key industries and what the top infections are by sector
    -How Security Ratings are generated and the impact botnets and other risk vectors have on these security performance metrics
  • From the SOC to the BOD: The Board’s Role in Cyber Security Recorded: Mar 26 2015 48 mins
    Donna Dabney, Executive Director of The Conference Board Governance Center; Bill Ide, Partner at McKenna Long & Aldridge
    As major breaches cause financial and reputational damage to businesses across all industries, there is a push for cyber security to become a board level issue. A recent survey from BDO International found 59% of board directors have become more involved in cyber security within the past twelve months. But how can board members unfamiliar with the ins and outs of network security effectively manage these risks?

    Join BitSight’s VP of Business Development, Jacob Olcott, Partner at McKenna Long & Aldridge, Bill Ide and the Executive Director of The Conference Board Governance Center, Donna Dabney on Thursday, March 26 at 11:00am EDT for an online roundtable discussion on board involvement in cyber security. The panelists will discuss how both security leaders and board members should approach the communication and management of cyber risks in the enterprise.

    Attendees will also learn:

    - What cyber security metrics are most important for the board
    - Methods for security leaders to communicate cyber issues across the enterprise
    - How BitSight’s platform enables communication on security performance throughout the enterprise
  • BitSight Security Ratings Product Demo Recorded: Mar 24 2015 37 mins
    Mathew Cherian, Product Manager, BitSight
    BitSight Security Ratings are an automated, data-driven assessment of network security performance that are being used by leading organizations to:

    - Benchmark Security Performance: Measure the impact of your security program & communicate key performance metrics with the board.

    - Manage Third Party Cyber Risk: Continuously monitor security performance in third party networks and be alerted to potential security issues that put your information at risk.

    - Underwrite Cyber Insurance: Assess security performance of potential insureds to reduce underwriting risk.

    Join us to see how easily you can quantitatively monitor your security performance today.
  • Security Rivals? The Value of Measuring & Comparing Network Security Performance Recorded: Feb 27 2015 50 mins
    Stephen Boyer, CTO & Co-Founder, BitSight Technologies; Rebecca Sandlin, CIO, Roanoke College
    Who has earned the bragging rights as the most secure college athletic conference?

    Colleges have rivals both on the football field and in the classrooms, but how do they fare in security performance? Watch this webinar featuring Stephen Boyer, CTO and Co-Founder of BitSight Technologies, and Rebecca Sandlin, CIO of Roanoke College, to learn how the major athletic conferences compared in key security performance metrics. There is also a discussion about why security benchmarking is so significant in education.

    Watch this webinar to discover:

    - The unique challenges higher education faces in securing their networks and how benchmarking can help
    - Why performance varies across the industry, and how that translates into actionable intelligence for security teams
    - How Security Ratings are enabling Roanoke College to gain tremendous insights about security strategy and performance issues that they can share with their board.
  • Continuous Third Party Monitoring Powers Business Objectives Recorded: Feb 26 2015 48 mins
    Stephen Boyer, CTO & Co-Founder, BitSight Technologies; Featuring Renee Murphy, Senior Analyst, Forrester Research
    While many companies focus their effort on reducing cybersecurity risk, more threats are being discovered daily. Point-in-time, subjective questionnaires are not in line with the new regulations requiring continuous monitoring of vendors, partners and other third parties.

    In “Continuous Third Party Monitoring Powers Business Objectives,” BitSight CTO and Co-founder Stephen Boyer and guest speaker, Forrester Research Senior Analyst Renee Murphy will discuss the value businesses are finding in using a solution that has a constant eye on third party cyber threats.

    Boyer and Murphy will also discuss:

    - The results of the study BitSight commissioned Forrester Consulting to undertake, examining how IT decision-makers feel about objective, reliable and continuous monitoring.
    - What can be done beyond compliance to increase security performance.
    - Which industries stand to benefit most from using automated, objective information security data.
    - Specific use cases for continuous monitoring and how they help companies improve information security performance.
  • 'Tis the Season for Safer Shopping? An analysis of retail security performance Recorded: Jan 30 2015 37 mins
    Stephen Boyer, CTO & Co-Founder, BitSight Technologies
    Are retailers more secure now than last year? The retail industry has been a common target for data breaches, especially in the past year. Since the Target breach in December 2013, there has been at least one major breach reported every month. What makes retailers so vulnerable to cyber threats?

    Join Stephen Boyer, CTO of BitSight Technologies, for this webinar to learn:

    -How third parties make retailers more vulnerable to attack
    -Which security metrics can serve as meaningful performance indicators
    -How continuous performance monitoring can make retailers (and other companies) safer
    -What can be learned from benchmarking security performance against competitors and the industry.
  • The Overlooked Aspect of M&A Due Diligence: Info Security Risk Recorded: Jan 28 2015 43 mins
    Stephen Boyer, CTO & Co-Founder, BitSight Technologies
    Companies must assess many different risks when planning to acquire another business. The information security risk that a given company presents is an often-overlooked element during the M&A process, but its importance is growing with the proliferation of cyber attacks.

    During this webinar, BitSight CTO and Co-Founder Stephen Boyer will show you how to use Security Ratings to quickly and accurately assess the security risk an acquisition target brings to your information ecosystem.

    He will also explain:

    - How Security Ratings can help not just before, but also during and after the acquisition to make your entire network safer
    - The value of analyzing risk using Security Ratings
    - A case study of a customer using Security Ratings to drive risk-based conversations with acquisition targets
  • Transforming IT Risk Management With Security Ratings Recorded: Aug 14 2014 48 mins
    Stephen Boyer, BitSight Technologies | Jon Oltsik, Enterprise Strategy Group (ESG)
    If organizations have learned anything from the high volume of recent breaches, it’s that boards are paying attention to cyber security now more than ever, and they want to know one thing - are we more or less secure than the latest victim?

    Join Jon Oltsik of the Enterprise Strategy Group and Stephen Boyer of BitSight Technologies to learn how businesses are using security ratings to mitigate internal and external security risks while driving better communication of performance metrics with their boards. By allowing executives to measure and compare security performance over time, organizations are improving situational awareness and are able to make risk-based decisions about preparedness, resources, and overall security strategy.

    Attendees of this webinar will learn how:

    - Boards are challenged to understand security performance and why benchmarking key metrics can lead to better communication and transparency
    - Teams are using security metrics to show improvements across their business ecosystem
    - BitSight Security Ratings are generated and are being used by customers today
  • Security Ratings: A Big Data Approach to Measuring and Mitigating Security Risk Recorded: Apr 17 2014 46 mins
    Stephen Boyer of BitSight Technologies and Oliver Brew of Liberty International Underwriters
    The increasing volume of breaches we hear about in the news highlights the challenge risk managers face in working to address cyber risk. Current assessment methods, while insightful, are inadequate due to the pace at which security postures change, leaving organizations vulnerable and exposed in the blink of an eye. In order to truly reduce security risk, managers need more insight and better tools that allow for continuous visibility into the ever-changing network environments they are administering.

    Join Stephen Boyer, CTO and co-founder of BitSight Technologies, and Oliver Brew, Vice President of Professional Liability at Liberty International Underwriters (LIU) for this webinar to discover:

    - Why measuring security risk is difficult and how some assessment methods leave organizations vulnerable to threats and financial loss

    - How forward-looking organizations are using Big Data to reduce risk, increase transparency and address new regulatory requirements

    - Case Study: How LIU is using Security Ratings to mitigate risk
Find Out How Security Ratings can Reduce Your Company's Risk.
The BitSight Security Rating Platform gathers terabytes of data on daily security outcomes from hundreds of sensors deployed across the globe.

All of the data is externally available and collected without any intrusive testing. Data is classified into several risk categories, including botnets, spam, malware, unsolicited communication, DDoS, and system configuration, and then mapped to an organization's known networks.

BitSight’s sophisticated algorithms analyze the data for severity, frequency, duration, and confidence to create an overall rating of that organization’s security performance.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Security Ratings: A Big Data Approach to Measuring and Mitigating Security Risk
  • Live at: Apr 17 2014 4:00 pm
  • Presented by: Stephen Boyer of BitSight Technologies and Oliver Brew of Liberty International Underwriters
  • From:
Your email has been sent.
or close
You must be logged in to email this