Validate Security Performance to Rationalize Investments

Presented by

Major General Earl Matthews, VP of Strategy for Mandiant Security Validation

About this talk

In the first half of the last decade, the rule of thumb for cyber security spending was roughly 3-4% of a total IT budget. By the end of that decade, average security spending had risen by 300%. Today, the typical organization uses 30-70 security tools, and spending in this area has gone through the roof. With so many controls deployed, there is often duplication. But without reliable evidence of security controls performance, it’s impossible to know where overlap exists or where technology is not delivering intended value so leaders can reliably remove unneeded controls without increasing risk. With increasing pressure on boards of directors and CEOs to provide evidence that business assets are protected from the fallout of a potential breach, the need to justify security investments is now a key performance metric. General Earl Matthews will discuss how to align a cyber security program with desired business outcomes, including cost-cutting demands, and teach attendees how to rationalize cyber security investments and prove their value to the C-suite. Attendees will learn a proven methodology to financially rationalize cyber security investments through security validation. For the full Cyber Summit 2020 event program, please visit: https://www.fireeye.com/company/events/cyber-summit-2020.html

Related topics:

About this channel

Cybersecurity Effectiveness with Mandiant
Upcoming talks (0)
On-demand talks (48)
Subscribers (2405)
Mandiant Security Validation (formerly Verodin), has made it possible for organizations to validate the effectiveness of cyber security controls, thereby protecting their reputation and economic value. By measuring and testing security environments against both known and newly discovered threats, organizations can identify risks in security controls before a breach occurs and permits companies to rapidly adapt their defenses to the evolving threat landscape. Cybersecurity experts from around the globe share experiences about their journey to increase security effectiveness.