Hi [[ session.user.profile.firstName ]]

Leveraging a Risk-Based Approach to Vulnerability Management

Hear from security industry expert from Ovum on moving from silos to collaboration across security and IT teams. For years organizations have leveraged traditional Key Performance Indicators (KPIs) to define success in their Vulnerability Management programs. Unfortunately, this often pitts the security team, who drives the assignment of work, against the overloaded operations team, who performs the work, against one another. The transition to a risk-based approach offers many benefits including more effective communications, a shared understanding of priorities, and a unified sense of purpose. These benefits enable security and operations teams to truly work together to improve the effectiveness of your Vulnerability Management program.
Recorded Feb 27 2019 43 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Maxine Holt and Jason Farmer
Presentation preview: Leveraging a Risk-Based Approach to Vulnerability Management

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Balancing Cybersecurity Risk for the State of Arizona Recorded: Mar 19 2019 58 mins
    Morgan Reed and John Dasher
    In this webinar, we’re joined by Morgan Reed, Chief Information Officer for the State of Arizona. Morgan’s extensive experience in both private enterprise and the public sector puts him in a unique position to help us understand and benefit from how cybersecurity risk is being measured and controlled at the State of Arizona. We’ll discuss relevant cybersecurity risk topics, including his environment, how he views and communicates cybersecurity risk, some frameworks, and how you can go about applying his experience to your own environment, regardless of sector or vertical industry.
  • Leveraging a Risk-Based Approach to Vulnerability Management Recorded: Feb 27 2019 43 mins
    Maxine Holt and Jason Farmer
    Hear from security industry expert from Ovum on moving from silos to collaboration across security and IT teams. For years organizations have leveraged traditional Key Performance Indicators (KPIs) to define success in their Vulnerability Management programs. Unfortunately, this often pitts the security team, who drives the assignment of work, against the overloaded operations team, who performs the work, against one another. The transition to a risk-based approach offers many benefits including more effective communications, a shared understanding of priorities, and a unified sense of purpose. These benefits enable security and operations teams to truly work together to improve the effectiveness of your Vulnerability Management program.
  • Convergence of Cybersecurity and Fraud Recorded: Jan 23 2019 47 mins
    Dr. Srinivas Mukkamala, CEO & Co-Founder of RiskSense
    In most cases fraud, risk, and information security functions often only interact in the aftermath of a breach, and security and fraud point solutions typically remain isolated. With maturity in data pipelines, availability of shared data sets across risk, fraud, and information security, AI can be effectively used to detect anomalies and be predictive.

    In this webinar, Dr. Srinivas Mukkamala, a recognized expert on AI and neural networks, will discuss how a risk-based approach can facilitate the convergence of cybersecurity and fraud.
  • Continuous & Adaptable Security Models will Prevail Recorded: Dec 13 2018 49 mins
    Dr. Srinivas Mukkamala, CEO & Co-Founder of RiskSense
    Dr. Srinivas Mukkamala will share his views on the most dramatic security threats that will draw more attention in 2019. He will identify why new technologies will begin creating an even more porous and vulnerable IT infrastructure. Consider:

    - AI might be your friend but it also powers your foes
    - Robotic Process Automation (RPA) another crack in your attack surface
    - DevOps Automation tools as targets for administrative controls and chaos
    - API Keys becoming the keys to the kingdom

    There is hope and Dr. Mukkamala will illustrate how organizations can have improved visibility, detection, remediation, and response when dealing with growing reliance on these technologies in 2019 and beyond.
  • Risk is a Board Game - Navigating Board Conversations on Cybersecurity Risk Recorded: Nov 13 2018 61 mins
    Ed Amoroso and John Dasher
    You’ve gotten what you wished for. Cybersecurity and cyber risk are now board-level issues. Whatever barriers that once existed between business and security have disappeared, and your board is expecting a meaningful conversation on the topic. After all, board members can be held personally liable for business disruptions caused by security issues. Depending on how often these conversations occur, it’s probably safe to assume that the board has a) forgotten what you told them in the last meeting, and, b) wishes you framed your reporting in more of a business context, especially if they don’t have an IT or security background.

    In this webinar, we’ll be chatting with Ed Amoroso, former CISO for AT&T and founder and CEO of TAG Cyber. Ed’s extensive experience interacting with board members and recent publications on the topic will serve as the backdrop for walking through a few of his favorite questions that board members should be asking you about cybersecurity risk, and how you can go about providing answers that matter.
  • Getting Off the Threat & Vulnerability Management Treadmill Recorded: Nov 9 2018 22 mins
    John Dasher
    Organizations “know” what they need to do. They scan, find piles of vulnerabilities, then rush to patch. But low and behold, they aren't sure that their patching efforts are improving their security posture, and with patch tickets accumulating at an alarming rate, they fall further and further behind. Why? What’s wrong?

    Unfortunately, Security and IT teams often find themselves in this unenviable position. The good news is that there’s a movement afoot that can rescue them. In this session you will learn how a risk-based approach to vulnerability management reduces vulnerability fatigue while improving workflow efficiency and personnel productivity in a truly measurable way.
  • Taming the Security Data Tsunami Recorded: Oct 26 2018 20 mins
    Kristy Zyburo
    Today's security and IT teams are suffocating under an avalanche of security data. The sheer volume of the data, along with its multiple origins in siloed systems all but guarantee that it lacks context, meaning, and is difficult to make actionable.

    Learn how RiskSense harnesses the vulnerability data you have, adds context with threat intel, and incorporates business asset criticality as well as pen test findings to tame your security data tsunami.
  • Predictive Intelligence: Vulnerability Weaponization and Exploitation Recorded: Sep 18 2018 43 mins
    Dr. Srinivas Mukkamala, Co-Founder and CEO of RiskSense
    The key to effectively reducing the attack surface is remediating exactly the right vulnerability or weakness that will be used by the adversary. While the idea is simple enough, executing on it has proven to be one of the largest challenges facing enterprises.

    The impact of this lack of visibility into the attacker journey is that vulnerability remediation strategies are likely unaligned, and therefore ineffective.

    There’s no data that supports the hypothesis to align early weaponization to breaches, which makes it hard to know when it is the ideal time to fix the vulnerability or weakness.

    Vulnerability prioritization and weaponization prediction must be fueled with data and domain expertise. Fixing thousands of vulnerabilities is not enough. We need to make sure we are fixing the right vulnerabilities, at the right time. In this talk we will cover:

    • Quantitative and Qualitative: details on RiskSense threat dataset and data sources that allows us to uniquely separate “signal” from “noise”.
    • Unprecedented visibility into attack validation data: from over 10+ years, this enables us to reconstruct the complete attacker journey and understand time-based patterns.
    • Insights into Vulnerability life cycle: weaponization and breach latency. This will allow us to determine no engagement vs. engagement from a remediation standpoint.
    • Attributes and variables: used for Machine Learning to predict Weaponization and Breach Susceptibility

    This presentation will be given by Dr. Srinivas Mukkamala, Co-Founder and CEO of RiskSense. RiskSense’s team was the first to predict WannaCry and has since released Koadic Post Exploitation Command & Control.
  • Top 10 Tips for Selecting a Threat and Vulnerability Management Solution Recorded: Aug 31 2018 61 mins
    David Monahan (EMA) and John Dasher (RiskSense)
    With all the news about cyberattacks, it’s easy to feel like there aren’t enough people to cover all of the security bases. This means proper identification and management of threats and vulnerabilities is an absolute necessity to keep risk at its lowest levels.

    Join David Monahan, managing research director at leading IT analyst firm Enterprise Management Associates (EMA), and John Dasher of RiskSense, to learn why a threat and vulnerability management solution is a must have for your security portfolio.

    During this webinar you will learn:
    - How threat and vulnerability management solutions with prioritization improve security operations efficiency
    - How to use a threat and vulnerability management and prioritization solution to garner greater support for security and improve security operations and business management alignment
    - The top 10 criteria you need to consider when selecting a solution
    - How to maintain a risk-based security management program
  • Piecing Together IoT Risk from Flexible & Fractured Design Components Recorded: Jun 12 2018 47 mins
    Dr. Srinivas Mukkamala, CEO and Co-Founder, at RiskSense
    How do you handle risk assessment and vulnerability management for IoT when multiple security patterns need assessment? There is a new frontier for security that requires breaking conventional control and mitigation assumptions before a Frankenmonster rises from your IoT project.

    In this webinar, RiskSense CEO and Co-Founder Dr. Srinivas Mukkamala will discuss:

    - The assessment of chaining together multiple vulnerabilities and the potential exploit path through flexible and fractured design components for IoT.
    - Consideration for dynamically changing devices and utilization models that break traditional security and risk assessments.
    - IoT risk and the growing need to incorporate threat data, unintentional device use-cases, and the mechanisms to keep constant control of the devices themselves.
  • Do More to Safeguard Your Election Systems Recorded: May 16 2018 30 mins
    Srinivas Mukkamala and Chris Coyle
    Last month, Congress authorized $380 million in federal funding for states to improve and enhance election security. Do you have a plan to take full advantage your allotted funding?

    While the priorities for states differ, many experts are recommending careful consideration of cybersecurity improvements as your top priority.

    RiskSense would like to invite you to join us this webinar titled "Do More to Safeguard Your Election Systems". In this presentation we will discuss how to improve the security of your election systems, voter registration, and vote tabulation systems. We will suggest industry best practices to establish a more secure, scalable, and more sustainable approach to improving your state’s election security.
  • No Safe Harbors: Charting a Smarter Course Recorded: Mar 21 2018 62 mins
    Mark DuPont, Alan Rudd, Sage Wagner
    Is the status quo really an option? What do maritime stakeholders (shipping companies, terminal operators, cruise lines, port authorities) need to do to prevent, prepare for and respond to the next attack on the horizon?

    To coin an old adage that has been used in many sports discussions and is also known as a principal of war, "The best defense is a good offense." This webinar will demonstrate tools and resources that maritime stakeholders can utilize to be Proactive and control their cyber risk.

    This webinar, focused on maritime operations, will provide unique insights of the recent cyber events and emerging threats. We will also:
    • Discuss nationally-recognized solutions and management approaches that can lead your organization to a proactive and predictive posture with a Cyber Risk Management strategy,
    • Include experts from a “bench” of cybersecurity experts that are recognized internationally for their knowledge and skills,
    • Demonstrate our Cyber Risk Management platform that can give you the “Situational Analysis and Awareness” that you need in today’s rapidly expanding and complex environment, and
    • Learn how we can provide you the same resources that the Department of Defense, NASA, and other federal agencies use and trust, with RiskSense.

    Attending this webinar will provide you and your staff valuable insights and offer a course of action that can be a game changer for all maritime organizations
  • Vulnerability Management in the Age of the Incident Recorded: Feb 5 2018 27 mins
    Danny Quist, RiskSense CTO
    This RiskSense Best Practices Webinar will dive into how organizations can reduce incident response costs with proactive vulnerability management. Security patches are an expensive undertaking for an organization, however the positive impacts outweigh the negative. This webinar will provide a framework for you to help make the case for fast patching, remediation, and improved security. We will provide tools, techniques, and processes to reduce the number of security incidents at your organization, and save a substantial amount of money.
  • Data-Driven Prioritization:The Role of AI in Vulnerability and Threat Management Recorded: Jan 16 2018 48 mins
    Dr. Srinivas Mukkamala, Co-founder and CEO, RiskSense
    The conventional approach to vulnerability and threat management is rapidly changing to a data-driven strategy in which remediation efforts are targeted to individual vulnerabilities based on their exploitability, exploit pulse, and environment.

    This approach will revolutionize vulnerability management – especially in the remediation of most common vulnerabilities that are frequently exploited – but its success depends on the availability of reliable data, which can have many biases and uncertainties.

    Weaponization analysis can be used for early warning, diagnosis, remediation prioritization, and prescriptive information on what to fix and how to fix vulnerabilities that matter.

    While many vulnerabilities are identified, a few prove to be successful for attackers. In this talk we will present how AI will play a key role to ensure remediation recommendations that are targeted for vulnerabilities that is exploitable.
  • What Your Vulnerability Scanner is Not Telling You Recorded: Dec 14 2017 41 mins
    Anand Paturi and Barry Cogan
    A recent, significant data breach in 2017 has caused people to take a deeper look into Apache Struts vulnerabilities. This weakness emphasized the impending risks for Apache Struts-based applications. Even today, scanners do not detect all known vulnerabilities. As of November 2017, the leading scanners still missed 14 total unique Common Vulnerabilities and Exposures (CVEs).

    In this webinar, we will analyze Apache Struts-related vulnerability weaponization patterns spanning the last decade. We will also provide insight into exploit patterns through a live exploit demonstration and explain how these patterns can define an organization’s risk management strategy.

    Hear from RiskSense’s Anand Paturi (VP of Research and Development) and Barry Cogan (Senior Security Analyst) as they guide us through the live demonstration and provide insights into exploit patterns
    and how attacks can be avoided.
  • How the State of AZ Took a Proactive Stance to Optimize Cyber Risk Management Recorded: Nov 20 2017 52 mins
    Morgan Reed, Mike Lettman, and Dr. Srinivas Mukkamala
    In this webinar, Morgan Reed (CIO) and Mike Lettman (CISO) from the State of Arizona will discuss with RiskSense CEO Srinivas Mukkamala a case study on how the State of Arizona has implemented a proactive cyber risk management program that uses a credit score like model for assessing threats and remediating those that matter most.

    Mr. Reed, Mr. Lettman, and Dr. Mukkamala will continue and expand on their conversation initially started during a learning lounge panel at this year's 2017 NASCIO Conference. They will dive into the details of how their risk management approach has enabled IT to better measure and communicate risk to business leaders, and strategically focus on the most imminent cyber vulnerabilities in their environment.
  • Lessons of a Cyber Attack to Prevent Future Cyber Epidemics Recorded: Nov 14 2017 47 mins
    Srinivas Mukkamala PhD., CEO and Co-Founder RiskSense
    The impact of malware outbreaks in 2017 is short lived compared to the ones we saw a decade ago. One of the key observations in 2017 is we have seen an attack that was infectious across the Internet and also an attack that was not infectious but had similar significant impact.

    Cyber epidemics are starting to afflict all business by impacting critical IT infrastructure. To increase the organization’s resilience against cyber-epidemics, you need to validate your attack surface and its susceptibility to attacks.

    Cyber-attacks tend to resemble a power law distribution in which a few dozen infiltration vectors account for most breaches and a “long tail” consisting of a large number of less common infiltration vectors account for the rest. It is important to provide timely and accurate information to keep the number of infiltrations low and the impact to your business reduced.

    What you will learn from this webinar:

    - How to prioritize what is most important when an attack happens.
    - Visibility into your attack surface and how to validate what the exposure is.
    - How to establish a metric based risk management program.

    About the Presenter:
    Srinivas Mukkamala is one of the Co-founders and CEO of RiskSense, a cyber security spinoff of New Mexico Tech. Srinivas has been researching and developing security technologies for over 15 years, working on malware analytics (focus on medical control systems and nontraditional computing devices), breach exposure management, Web application security, and enterprise risk reduction.

    Srinivas was one of the lead researchers for CACTUS (Computational Analysis of Cyber Terrorism against the US). Dr. Mukkamala has over 120 peer-reviewed publications in the areas of malware analytics, digital forensics, data mining, and bioinformatics. He has a patent on Intelligent Agents for Distributed Intrusion Detection System and Method of Practicing.
  • Machine Against Machine: The New Cyber Security Paradigm Recorded: Oct 13 2017 53 mins
    Dr. Srinivas Mukkamala, Co-founder and CEO, RiskSense Inc.
    Are we prepared to deal with malevolent AI? Artificial Intelligence (AI) can bolster defenses by analyzing vast volumes of data and assist cyber security professionals the converse is true as well; malevolent AI can assist hackers find their targets faster and launch attacks faster. Finding effective vulnerability threat pairs is difficult for multiple reasons. In an asymmetric war defenders have to know all possible vulnerability threat pairs, while an attacker will get away by knowing just a few successful ones. Our goal is to achieve a proof of principle for how we can predict successful vulnerability threat combinations using AI, without the need to brute force thousands of combinations. In this webinar, RiskSense CEO Srinivas Mukkamala will discuss with RiskSense Security Researchers Sean Dillon and Ben Mixon-Baca a recent case study where the combination of human expertise and Artificial Intelligence (AI) was able to mimic a human hacker to find vulnerable threat pairs and launch exploits at a tremendous scale.
  • Cyber Risk Management: What’s Holding Us Back? Recorded: Aug 15 2017 48 mins
    Danny Quist
    Over the past year, cyber risk management has gained a lot of attention in the media and among practitioners. Even though risk management has been proven to optimize business performance and lead to better investment decisions, many organizations have still not adopted this concept when it comes to their enterprise security model.

    This webinar will examine the obstacles that are preventing organizations from implementing cyber risk management and how they can be overcome.
  • How Continuous Cyber Risk Scoring Helps State and Local Governments Tackle Today Recorded: May 8 2017 59 mins
    Mike Lettman and Srinivas Mukkamala
    Many cyber security professionals in the state and local government community are still grappling with how to implement a continuous cyber defense program that improves their information security posture and ensures compliance with NIST and other relevant guidance (i.e., FISMA, FedRAMP).

    Considering the massive volume of assets, associated controls, and vulnerabilities that agencies must deal with under a continuous diagnostics concept, they often lack the resources to handle the aggregation, normalization, and correlation of this data. This results in lengthy remediation cycles.

    In this webinar, Mike Lettman, Chief Information Security Officer for the State of Arizona, and Dr. Srinivas Mukkamala, renown cyber security expert and CEO of RiskSense, will illustrate how state and local government agencies can leverage a continuous cyber risk score to pro-actively discover and address cyber security gaps based on the risk they pose to their mission.
Pioneer in Vulnerability Prioritization and Threat Management
RiskSense®, Inc. provides vulnerability prioritization and management to measure and control cybersecurity risk. The cloud-based RiskSense platform uses a foundation of risk-based scoring, analytics, and technology-accelerated pen testing to identify critical security weaknesses with corresponding remediation action plans, dramatically improving security and IT team efficiency and effectiveness.
The company delivers a fully-informed picture of group, department, and organizational cybersecurity risk with our credit-like RiskSense Security Score (RS3). The RiskSense platform continuously correlates customer infrastructure with comprehensive internal and external vulnerability data, threat intelligence, human pen test findings, and business asset criticality to measure risk, provide early warning of weaponization, predict attacks, and prioritize remediation activities to achieve security risk goals. For more information, visit www.risksense.com or follow us on Twitter at @RiskSense.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Leveraging a Risk-Based Approach to Vulnerability Management
  • Live at: Feb 27 2019 9:30 pm
  • Presented by: Maxine Holt and Jason Farmer
  • From:
Your email has been sent.
or close