Hi [[ session.user.profile.firstName ]]

Vendor Risk, Data Breach and its Business Impact

Two out of three companies rely on third party vendors for business critical and day to day operations. Vendors of various types such as consulting, business partners, supply chains, and contractors have legitimate user accounts and access to key organizational resources. Join Rick Holland, Principal Analyst, Forrester Research and Ryan Stolte, CTO and Founder, Bay Dynamics for a live webinar on Tuesday, November 3, 2015 at 10:00 am PT/1:00 pm ET, as they use real world examples and specific use cases to provide more insight into:

•How vendors are increasingly being used as attack vectors by cyber criminals
•Challenges in measuring and gaining visibility into vendor risk
•How to protect your organization from vendor risk
Recorded Nov 3 2015 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Rick Holland, Principal Analyst, Forrester and Ryan Stolte, co-Founder and CTO, Bay Dynamics
Presentation preview: Vendor Risk, Data Breach and its Business Impact
  • Channel
  • Channel profile
  • Protecting Your Crown Jewels with Security Analytics Recorded: Nov 17 2016 61 mins
    Doug Cahill, Senior Analyst, Cybersecurity, Enterprise Strategy Group, Inc., Ryan Stolte, Co-Founder and CTO, Bay Dynamics
    Effective cyber risk management depends upon security analytics technology. However, as more enterprises and vendors see the value in this technology, more hype and misconceptions come to surface. In some cases, security analytics is being used interchangeably with solutions like SIEM and user behavior analytics when in reality, those solutions are components of a security analytics platform. To clear the confusion, Enterprise Strategy Group's Senior Analyst of Cybersecurity, Doug Cahill, and Bay Dynamics co-founder and CTO Ryan Stolte are hosting a webinar which will dive deep into what security analytics really is and how organizations can most effectively use it to reduce cyber risk to their crown jewels.
  • NY State Cybersecurity Requirements for Financial Firms: Why Should You Care? Recorded: Nov 8 2016 45 mins
    Johna Till Johnson CEO and Founder Nemertes Research, Steven Grossman VP Strategy & Enablement Bay Dynamics
    The New York State Department of Financial Services (NYS DFS) recently issued proposed regulations for financial services firms in NYS to go into effect in January 2017. The regulations are groundbreaking in some respects, in particular in that they include requirements for emerging (or not yet fully emerged) technology categories. Yet, there are also significant gaps. Find out what these regulations may mean for your organization (whether or not you’re a financial services firm, or do business in New York). You’ll learn from the experts at Nemertes Research and Bay Dynamics how you can leverage the regulations to strengthen your cyber risk posture and take strides towards better protecting your company.
  • An Asset-Centric Approach to Manage Cyber Risk Recorded: Aug 31 2016 56 mins
    Humphrey Christian, Vice President, Product Management, Bay Dynamics
    Enterprises, both large and small, all have vulnerability management solutions. However, security teams are overwhelmed by the mountain of vulnerabilities uncovered by these solutions. Once they determine which endpoints, systems and applications are vulnerable to an attack, they do not know which steps to take next and in what order. As a result, they spend countless hours manually determining who owns the vulnerable asset, the value of that asset, if it was compromised and if there is an active threat to that asset.

    Join us for a live webinar on Wednesday, August 31, 2016 at 10am PT as Humphrey Christian, Vice President, Product Management, Bay Dynamics, discusses why organizations and business stakeholders, need an asset-centric approach to provide a fully integrated view of threats, vulnerabilities, asset value and business context. He will also give a live demonstration of the Bay Dynamics Risk Fabric cyber risk platform and provide examples of how our customers have used it to build asset-centric risk management programs that allow security teams, line-of-business leaders, C-level executives and boards of directors to determine which threats and associated vulnerabilities could lead to a compromise of their most valued assets and what steps need to be taken in order to reduce that risk.

    Register for the live webinar to learn more about:
    • Understanding your Assets at Risk by protecting your high value assets that can be exploited by threats and vulnerabilities
    • Why it is important to take an asset-centric approach to effectively manage cyber risk
    • How Risk Fabric cyber risk analytics platform servers as a centerpiece for this asset-centric approach through a live demonstration
  • Security Analytics for Effective Cyber Risk Management Recorded: Jun 23 2016 55 mins
    Anil Nandigam, Sr Director, Product Marketing
    Organizations' ultimate goal is protecting corporate assets and reducing cyber risk around them. A multitude of security tools, both traditional and advanced, are deployed towards attaining this goal. But in order to truly address today’s cyber risk challenges, organizations need a security analytics platform that automates the process of aggregating data from existing security tools, enables understanding the assets at risk, and effectively communicates cyber risk to the right people at right time. In this presentation, you will learn how the Bay Dynamics Cyber Risk Analytics platform goes beyond traditional SIEM and User Behavior Analytics solutions to provide a prescription for organizations to measurably reduce cyber risk.
  • Beyond Vulnerability Management Recorded: May 23 2016 13 mins
    Gautam Aggarwal, Chief Marketing Officer, Bay Dynamics
    With today's multi-layered attack surface, traditional vulnerability management no longer suffices. Security leaders must embrace a new strategy to help identify and secure true assets at risk. Gautam Aggarwal of Bay Dynamics explains how.

    The challenge isn't identifying and taking inventory of assets at risk - organizations are adept at that. Where they fall short is at knowing which assets need the most attention, says Aggarwal, CMO at Bay Dynamics.

    "When it comes to prioritizing which assets to come back and mitigate, that is the challenge for [security leaders]," Aggarwal says. "They still lack context."

    All assets are valuable, Aggarwal points out. But some hold a higher cyber-value at risk than others. The key is not just to identify those assets, but to develop strong relationships with the line of business leaders who control those assets. Those relationships will reveal the business context necessary to making smarter security decisions.

    In an interview in the topic of securing assets at risk, Aggarwal discusses:

    - The flaws in traditional vulnerability management
    - How to identify and prioritize assets at risk
    - Why and how to engage line of business leaders in this discussion
  • Managing Cyber Risk From the Inside Out Recorded: Apr 28 2016 46 mins
    Humphrey Christian, Vice President, Product Management, Bay Dynamics
    Security practitioners must take a proactive, inside out approach to managing their organization’s cyber risk. But the challenges lie in effectively measuring the overall risk posture of the business. The manual process tied to analyzing security data today is demanding and error prone. To address this, the security and risk department needs an automated and repeatable process that makes sense of the volumes of security data from their existing solutions. This would allow them to effectively communicate a traceable and actionable view of cyber risk to line of business owners and the board of directors.

    Please join us on Thursday, April 28, 2016 at 10:00 a.m. PT for a live Bay Dynamics webinar as Humphrey Christian, Vice President, Product Management, explains how your organization can obtain a 360 degree view of your cyber risk posture.
  • Making Sense of Threat Intelligence Recorded: Feb 25 2016 52 mins
    Al Cooley, Director, DeepSight Cyber Intelligence, Symantec & Humphrey Christian, VP, Product Management, BayDynamics
    As the cyber threat landscape expands, so does need for good threat intelligence. The marketplace has exploded with sources of threat information, from the Internet, to open source code, to commercial threat data. But companies struggle with finding a way to collect the right threat information, to organize and prioritize it into true insights that are meaningful to their businesses.

    Join this live webinar to hear about the power of threat intelligence combined with analytics and how you can use the joint offering with Symantec DeepSight and Bay Dynamics Risk Fabric, a Cyber Risk Analytics platform, to protect your assets from the ever changing threat landscape in today’s cyberspace.

    You will learn:
    • What is effective threat intelligence?
    • How the different processes in your security and risk organization benefit from threat intelligence
    • How your vulnerability and risk management teams can benefit from threat intelligence
    • How Symantec and Bay Dynamics can help vulnerability and risk management teams become more productive in integrating threat intelligence into their workflow and maturing their capabilities
  • Cyber Risk Readiness – The gap between perception and data Recorded: Jan 21 2016 50 mins
    Humphrey Christian, VP Product Management, Bay Dynamics
    Bay Dynamics commissioned a study with Osterman Research to find out how prepared the large retailers were for dealing with cyber risk from hiring large temporary workers. The study revealed some surprising findings including how little organizations knew about their high value systems and the type of access granted to temporary workers. In fact, almost 40% of retailers don’t know which systems their temporary employees access in their organization.

    Please join us on Thursday, January 21, 2016 at 10:00 am PT for a live Bay Dynamics webinar as Humphrey Christian, VP Product Management discusses the findings from this report, and its implications across different verticals. The webinar will highlight best practices to address the report findings and will demonstrate how our Risk Fabric Platform can help build effective cyber risk reduction programs for enterprises.
  • The Insider Threat: Employees and Vendors as Attack Vectors Recorded: Dec 8 2015 48 mins
    Anil Nandigam, Head of Product Marketing, Bay Dynamics
    Target, Home Depot and The Office of Personnel Management. These organizations have two things in common – they have all suffered from a data breach and the attackers broke in through a third party vendor. Our analysis also shows that in 90 percent of data loss prevention incidents – meaning when employees leak sensitive data outside an organization – the employees are legitimate users who innocently send out data for business purposes.

    Join this webinar to learn more about:

    - How to manage the data deluge from various security tools and alerts to identify the threat within

    - Best practices and tools to make employees more security conscience

    - Products and solutions for security professionals to address all aspects of cyber risk from vendors and employees

    - How to increase security awareness, and use Just-In-Time training to change behavior of negligent insiders
  • Vendor Risk, Data Breach and its Business Impact Recorded: Nov 3 2015 61 mins
    Rick Holland, Principal Analyst, Forrester and Ryan Stolte, co-Founder and CTO, Bay Dynamics
    Two out of three companies rely on third party vendors for business critical and day to day operations. Vendors of various types such as consulting, business partners, supply chains, and contractors have legitimate user accounts and access to key organizational resources. Join Rick Holland, Principal Analyst, Forrester Research and Ryan Stolte, CTO and Founder, Bay Dynamics for a live webinar on Tuesday, November 3, 2015 at 10:00 am PT/1:00 pm ET, as they use real world examples and specific use cases to provide more insight into:

    •How vendors are increasingly being used as attack vectors by cyber criminals
    •Challenges in measuring and gaining visibility into vendor risk
    •How to protect your organization from vendor risk
  • Let the Data Tell Your Story Recorded: Aug 25 2015 47 mins
    Gautam Aggarwal, Chief Marketing Officer, Bay Dynamics
    Organizations spend billions on data security solutions and tools. Yet, high profile data breaches continue unabated. Join our live webinar on Tuesday, August 25, 2015 at 10:00 am PT/1:00 pm ET to find out how to identify and tackle these blind spots that put your business at risk.
  • Anatomy of a Modern Breach: Post-Malware Age Recorded: May 21 2015 47 mins
    Eric Ouellet, VP Strategy, Bay Dynamics
    The anatomy of modern threats goes beyond legacy and advanced malware.Did you know that 100% of the victims of modern breaches have had defense in depth technologies – firewalls, IPS, or advanced malware systems. Despite that, it takes organizations 6+ months on an average to find out that they have been compromised!
     
    Join our webinar on Thursday, May 21, 2015 at 10:00 am PT/ 1:00 pm ET to learn more about:
     
    Modern threat vectors -  users, applications and systems
    Recent high profile data breaches and ideal requirements for threat detection and response
    How to get comprehensive visibility when most security tools in today’s enterprises operate in silos
     
    Eric Ouellet, a Gartner Analyst for 10 years, will use real world examples of recent high profile data breaches to help understand the Anatomy of a Modern Breach and the ideal requirements to detect the modern threats.
Cyber Risk Predictive Analytics for Actionable Visibility
Bay Dynamics® is the market leader in cyber risk predictive analytics providing actionable visibility into organizations’ cybersecurity blind spots, complete with business risks and threats. The company’s purpose-built Risk Fabric® platform assembles and correlates relevant data from existing tools in a novel patented way to provide actionable cyber risk insights, before it’s too late. Bay Dynamics enables some of the world’s largest organizations to understand the state of their cybersecurity posture, including contextual awareness of what their insiders, vendors and bad actors are doing, which is key to effective cyber risk management

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Vendor Risk, Data Breach and its Business Impact
  • Live at: Nov 3 2015 6:00 pm
  • Presented by: Rick Holland, Principal Analyst, Forrester and Ryan Stolte, co-Founder and CTO, Bay Dynamics
  • From:
Your email has been sent.
or close