Building a Comprehensive Cyber Risk Program

Presented by

Syed Abdur, Brinqa, Director of Product

About this talk

In this session, presented originally at the Qualys Security Conference is Las Vegas on Oct 19 2017, we discuss how Brinqa customers are creating a new breed of cyber risk intelligence programs by making Qualys vulnerability management a central focus of their efforts. These programs take vulnerability management effectiveness to a new level, by introducing automation at every step of the process – whether it is integration and correlation of data from multiple sources, prioritization of vulnerability and asset risks, creation and management of tickets based on optimal remediation strategies, or representation and distribution of real-time metrics and KPIs. By taking these core capabilities and applying them to additional sources of security data — asset inventory, network management, web application scanning, BC/DR, policy compliance, IDS/IPS, change and configuration management, directory services, SIEM, etc. — these programs are providing security analysts, business owners and executives with actionable insights that were previously unattainable.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (17)
Subscribers (1413)
Brinqa is leading the charge for a new wave of knowledge-driven, risk-based cybersecurity solutions. Brinqa Cyber Risk Graph - the knowledge graph for cybersecurity - connects relevant security and business data, establishes common data ontology, and powers cybersecurity decisions and outcomes. Brinqa solutions apply this knowledge to uniquely inform risk management strategies, standardize data management and analysis, deliver actionable insights, and automate risk remediation. With Brinqa, businesses get all the tools they need to implement risk-based cybersecurity — packaged in a high-performance, enterprise-grade platform. Brinqa solutions evolve with the business and provide a stable, robust and dynamic cybersecurity foundation that supports and enables true digital transformation.