Hi [[ session.user.profile.firstName ]]

How the State of AZ Took a Proactive Stance to Optimize Cyber Risk Management

In this webinar, Morgan Reed (CIO) and Mike Lettman (CISO) from the State of Arizona will discuss with RiskSense CEO Srinivas Mukkamala a case study on how the State of Arizona has implemented a proactive cyber risk management program that uses a credit score like model for assessing threats and remediating those that matter most.

Mr. Reed, Mr. Lettman, and Dr. Mukkamala will continue and expand on their conversation initially started during a learning lounge panel at this year's 2017 NASCIO Conference. They will dive into the details of how their risk management approach has enabled IT to better measure and communicate risk to business leaders, and strategically focus on the most imminent cyber vulnerabilities in their environment.
Recorded Nov 20 2017 52 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Morgan Reed, Mike Lettman, and Dr. Srinivas Mukkamala
Presentation preview: How the State of AZ Took a Proactive Stance to Optimize Cyber Risk Management

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • What Your Vulnerability Scanner is Not Telling You Dec 14 2017 7:30 pm UTC 45 mins
    Anand Paturi and Barry Cogan
    A recent, significant data breach in 2017 has caused people to take a deeper look into Apache Struts vulnerabilities. This weakness emphasized the impending risks for Apache Struts-based applications. Even today, scanners do not detect all known vulnerabilities. As of November 2017, the leading scanners still missed 14 total unique Common Vulnerabilities and Exposures (CVEs).

    In this webinar, we will analyze Apache Struts-related vulnerability weaponization patterns spanning the last decade. We will also provide insight into exploit patterns through a live exploit demonstration and explain how these patterns can define an organization’s risk management strategy.

    Hear from RiskSense’s Anand Paturi (VP of Research and Development) and Barry Cogan (Senior Security Analyst) as they guide us through the live demonstration and provide insights into exploit patterns
    and how attacks can be avoided.
  • How the State of AZ Took a Proactive Stance to Optimize Cyber Risk Management Recorded: Nov 20 2017 52 mins
    Morgan Reed, Mike Lettman, and Dr. Srinivas Mukkamala
    In this webinar, Morgan Reed (CIO) and Mike Lettman (CISO) from the State of Arizona will discuss with RiskSense CEO Srinivas Mukkamala a case study on how the State of Arizona has implemented a proactive cyber risk management program that uses a credit score like model for assessing threats and remediating those that matter most.

    Mr. Reed, Mr. Lettman, and Dr. Mukkamala will continue and expand on their conversation initially started during a learning lounge panel at this year's 2017 NASCIO Conference. They will dive into the details of how their risk management approach has enabled IT to better measure and communicate risk to business leaders, and strategically focus on the most imminent cyber vulnerabilities in their environment.
  • Lessons of a Cyber Attack to Prevent Future Cyber Epidemics Recorded: Nov 14 2017 47 mins
    Srinivas Mukkamala PhD., CEO and Co-Founder RiskSense
    The impact of malware outbreaks in 2017 is short lived compared to the ones we saw a decade ago. One of the key observations in 2017 is we have seen an attack that was infectious across the Internet and also an attack that was not infectious but had similar significant impact.

    Cyber epidemics are starting to afflict all business by impacting critical IT infrastructure. To increase the organization’s resilience against cyber-epidemics, you need to validate your attack surface and its susceptibility to attacks.

    Cyber-attacks tend to resemble a power law distribution in which a few dozen infiltration vectors account for most breaches and a “long tail” consisting of a large number of less common infiltration vectors account for the rest. It is important to provide timely and accurate information to keep the number of infiltrations low and the impact to your business reduced.

    What you will learn from this webinar:

    - How to prioritize what is most important when an attack happens.
    - Visibility into your attack surface and how to validate what the exposure is.
    - How to establish a metric based risk management program.

    About the Presenter:
    Srinivas Mukkamala is one of the Co-founders and CEO of RiskSense, a cyber security spinoff of New Mexico Tech. Srinivas has been researching and developing security technologies for over 15 years, working on malware analytics (focus on medical control systems and nontraditional computing devices), breach exposure management, Web application security, and enterprise risk reduction.

    Srinivas was one of the lead researchers for CACTUS (Computational Analysis of Cyber Terrorism against the US). Dr. Mukkamala has over 120 peer-reviewed publications in the areas of malware analytics, digital forensics, data mining, and bioinformatics. He has a patent on Intelligent Agents for Distributed Intrusion Detection System and Method of Practicing.
  • Machine Against Machine: The New Cyber Security Paradigm Recorded: Oct 13 2017 53 mins
    Dr. Srinivas Mukkamala, Co-founder and CEO, RiskSense Inc.
    Are we prepared to deal with malevolent AI? Artificial Intelligence (AI) can bolster defenses by analyzing vast volumes of data and assist cyber security professionals the converse is true as well; malevolent AI can assist hackers find their targets faster and launch attacks faster. Finding effective vulnerability threat pairs is difficult for multiple reasons. In an asymmetric war defenders have to know all possible vulnerability threat pairs, while an attacker will get away by knowing just a few successful ones. Our goal is to achieve a proof of principle for how we can predict successful vulnerability threat combinations using AI, without the need to brute force thousands of combinations. In this webinar, RiskSense CEO Srinivas Mukkamala will discuss with RiskSense Security Researchers Sean Dillon and Ben Mixon-Baca a recent case study where the combination of human expertise and Artificial Intelligence (AI) was able to mimic a human hacker to find vulnerable threat pairs and launch exploits at a tremendous scale.
Pioneer and market leader in pro-active cyber risk management
RiskSense is the pioneer and market leader in pro-active cyber risk management. The company enables enterprises and governments to reveal cyber risk, quickly orchestrate remediation, and monitor the results. This is done by unifying and contextualizing internal security intelligence, external threat data, and business criticality across a growing attack surface.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How the State of AZ Took a Proactive Stance to Optimize Cyber Risk Management
  • Live at: Nov 20 2017 8:40 pm
  • Presented by: Morgan Reed, Mike Lettman, and Dr. Srinivas Mukkamala
  • From:
Your email has been sent.
or close