Hi [[ session.user.profile.firstName ]]

From found to fixed - A day in the life of a security vulnerability

In an ideal world a security vulnerability is found, then fixed as quickly as possible by security and IT operations teams working together to reduce business risk and enforce cyber hygiene. Of course this is much easier said than done.

Tune into this webcast to see a demonstration of a day in the life of a vulnerability getting fixed by Vulcan Cyber, the only SaaS platform dedicated to orchestrating and automating end-to-end vulnerability remediation. See how Vulcan can be used to get your existing people, processes, and tools working in efficient harmony to secure IT.

This demo will start with a dashboard view of an organization's cyber posture comprised of data inputs pulled from vulnerability scanners like Tenable and asset repositories like ServiceNow. We will then show how Vulcan is used to prioritize vulnerability risk for your specific business. Once prioritized, the demo will show how Vulcan provides intelligent remedies such as patches, configuration change scripts, or workarounds for vulnerabilities reducing the research burden on security and IT operations teams. Vulcan is then integrated with tools like Jira used to orchestrate change management processes and work routing across teams, ultimately integrating with patch and configuration management tools like Ivanti or Ansible to automate remediation at scale.

Join us, to see for yourself how the Vulcan platform orchestrates vulnerability remediation through:
- Vulnerability risk prioritization
- The best vulnerability remedies and solutions as a service
- Cross-functional work orchestration and process automation
- Efficient remediation through automation at scale
- Integration with your existing tools, and support for your current teams and process investments
Recorded Oct 1 2020 34 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Nick Vann and Rhett Glauser
Presentation preview: From found to fixed - A day in the life of a security vulnerability

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Reduce Security Risk, Prioritize Remediation with IT Asset Compliance KPIs Jun 24 2021 3:00 pm UTC 45 mins
    Tal Morgenstern, Vulcan Cyber CPO; Navot Yellin, Vulcan Cyber product manager
    Enterprise IT security organizations are scrambling to protect their businesses from a growing threat of data theft and ransomware attacks. Little can be done post breach, and scare resources must be prioritized now to proactively reduce business risk by protecting your most valuable IT assets.

    Attend this webinar to learn about a new approach to risk and vulnerability prioritization and remediation. The Vulcan Cyber risk model has been updated to help IT security teams to measure risk compliance via IT asset health scores across logical business groupings. For the first time ever, enterprise cyber security teams can measure business risk against customizable security compliance KPIs while using these same KPIs to prioritize and orchestrate vulnerability remediation resources. See how risk can be reduced, and compliance attained, for the business IT assets that matter most. Track the progress of remediation campaigns from scan-to-fix as IT security teams address prioritized risks to protect your business from bad actors.

    Join us to see an overview and demo of:
    - A risk-compliant asset KPI as the driving measure underpinning remediation campaign priority.
    - A consolidated view of asset health based on vulnerability criticality and asset priority.
    - Customizable risk parameters and weighted vulnerability prioritization scores specific to your business' IT asset data.
    - More than just scan and prioritize, but full risk remediation orchestration.
  • A Live Demo of Risk-Driven Vulnerability Prioritization in Action Jun 22 2021 5:00 pm UTC 30 mins
    Dan Katz, Vulcan Cyber director of solution engineering
    Effective vulnerability remediation isn't possible without risk-driven vulnerability prioritization. Enterprise IT security teams don't have the bandwidth to stay on top of the constant crush of new vulnerabilities that may create risk specific to your business. The only answer is to focus fix through prioritization, and to reduce fix workloads through automation.

    Join us on this webcast to see a live demo of the SaaS platform built for risk-driven vulnerability prioritization. See how Vulcan Cyber can be used to get your existing people, processes, and tools working in harmony to secure IT.

    This demo will start with a dashboard view of an organization's cyber hygiene posture comprised of data inputs pulled from vulnerability scanners like Tenable, Qualys and Rapid7, and asset repositories like ServiceNow. We will then show how Vulcan Cyber is used to prioritize vulnerability risk for your specific business using threat intelligence feeds and customizable risk scoring tailored to your business. See the asset health score that will help your teams get fix done.

    All webcast attendees will be offered access to their own instance of Vulcan Free, the industry's only free vulnerability prioritization platform.
  • Integrating CI/CD with Risk Remediation for Comprehensive Application Security Recorded: Jun 8 2021 24 mins
    Yaniv Bar-Dayan, Vulcan Cyber CEO and co-founder
    Applications are driving the rapidly transforming digital economy. However, a combination of increased release cycles and application development speed, and an ever-more sophisticated threat landscape riddled with un-remediated, known vulnerabilities is increasing the size of the enterprise attack surface.

    Comprehensive cyber hygiene requires the coordination of remediation efforts across diverse environments including application development, cloud, traditional infrastructure and endpoints. The importance of security cannot be overstated, nor can the difficulty of maintaining application security specifically.

    A security-minded approach to continuous integration and continuous delivery has proven itself extremely useful in securing the software development lifecycle and related software supply chain, both internal and external.

    This session will outline the steps needed to integrate application security and DevSecOps practices with an overarching vulnerability remediation orchestration initiative. It will feature real-world examples using prescriptive workflows that measure and drive holistic enterprise security. This session will also cover:
    - Orchestration best practices, including how to automate application updates and security testing.
    - Dev infrastructure security considerations including patch management.
    - Integration of remediation efforts across diverse environments.
    - Post-test testing.
    - Update and validate container image security.
    - Kubernetes maintenance
  • Enforcing Cyber Hygiene Across Applications, Endpoints and Clouds Recorded: Jun 3 2021 48 mins
    Scott Crawford - 451 Research / Yaniv Bar-Dayan - Vulcan Cyber / Conor Sherman - ezCater / Khanh Tran - CrowdStrike
    Enterprise IT security teams are trying to enforce cyber security across applications, IT endpoints and cloud environments. Complexity is brought on by digital scale and diversity and is increasing exponentially. Add another operating system, cloud or code base to the mix and security becomes even more difficult to enforce. Today complexity is the rule, not the exception.

    Even the simplest of environments still requires at least a dozen different tools to drive meaningful and efficient cyber hygiene. In an ideal world a security vulnerability is found, prioritized, then fixed within days by collaborative security and IT teams working together. This is much easier said than done, especially when these teams each have their own tools dispersed across these diverse environments.

    Register for this roundtable discussion with cyber security veterans to learn how the secure enterprise calibrates its toolset to get fix done. Topics will include:
    - Finding the 'right tool for the right job is a lot more complex than it’s ever been. With distinctions among endpoint, cloud and application tactics – and the disruption of new techniques like DevOps tools and processes – how do organizations cope?
    - Tearing down silos between IT and security teams to get the most out of best-of-breed tools through integration and orchestration.
    - The scale monster is coming. Automate before it eats you.
    - You can’t fix what you can’t measure. Remediation analytics for cyber hygiene success.
  • Integrating CI/CD with Risk Remediation for Comprehensive Application Security Recorded: May 21 2021 24 mins
    Yaniv Bar-Dayan, Vulcan Cyber CEO and co-founder
    Applications are driving the rapidly transforming digital economy. However, a combination of increased release cycles and application development speed, and an ever-more sophisticated threat landscape riddled with un-remediated, known vulnerabilities is increasing the size of the enterprise attack surface.

    Comprehensive cyber hygiene requires the coordination of remediation efforts across diverse environments including application development, cloud, traditional infrastructure and endpoints. The importance of security cannot be overstated, nor can the difficulty of maintaining application security specifically.

    A security-minded approach to continuous integration and continuous delivery has proven itself extremely useful in securing the software development lifecycle and related software supply chain, both internal and external.

    This session will outline the steps needed to integrate application security and DevSecOps practices with an overarching vulnerability remediation orchestration initiative. It will feature real-world examples using prescriptive workflows that measure and drive holistic enterprise security. This session will also cover:
    - Orchestration best practices, including how to automate application updates and security testing.
    - Dev infrastructure security considerations including patch management.
    - Integration of remediation efforts across diverse environments.
    - Post-test testing.
    - Update and validate container image security.
    - Kubernetes maintenance
  • Top Mistakes Everybody Makes in Vulnerability Management and How to Avoid Them Recorded: Apr 29 2021 26 mins
    Yaniv Bar-Dayan, Vulcan Cyber co-founder and CEO
    Vulnerability management initiatives too often fall short of the objective to secure digital infrastructure. Lots of scanning and vulnerability prioritization, but not a lot of actual remediation. Admittedly, moving from simple vulnerability management to deliberate vulnerability remediation isn’t easy. There are so many moving parts, with dozens of stakeholders, and a crush of infrastructure with related vulnerabilities growing exponentially.

    Join Yaniv Bar-Dayan, Vulcan Cyber co-founder and CEO, to learn how to avoid the top five mistakes everybody is making in vulnerability management. You’ll also learn:
    • The top five mistakes in vulnerability management.
    • How you can avoid these mistakes by shifting the objectives from vulnerability management to vulnerability remediation.
    • How the Vulcan Cyber platform can help your team get fix done through scan-to-fix vulnerability remediation orchestration.
  • How HBO Max and Snowflake deliver customer-centric cybersecurity Recorded: Mar 9 2021 24 mins
    Yaniv Bar-Dayan, Vulcan Cyber CEO | Brian Lozada, HBO Max security leader | Omer Singer, Snowflake head of cyber strategy
    Watch the last three keynotes from The Remediation Summit 2020 delivered by Yaniv Bar-Dayan, Vulcan Cyber CEO, Brian Lozada, HBO Max security leader, and Omer Singer, Snowflake head of cyber security strategy.

    These keynotes provide insights on delivering customer-centric security and the intersection of vulnerability management and data security.

    Keep watching for the final keynote in which Yaniv announces the availability of Vulcan Remedy Cloud and Vulcan remediation analytics as two new vulnerability remediation orchestration services from Vulcan Cyber.

    Join the Vulcan Cyber community at https://vulcan.io/community and start using Remedy Cloud today for free at https://vulcan.io/remedy-cloud
  • CISO Perspectives On Business Risk Recorded: Feb 18 2021 25 mins
    Andy Ellis, Akamai CSO; Steve Zalewski, Levi's deputy CISO
    Andy Ellis, Akamai CSO, and Steve Zalewski, Levi's deputy CISO, open The Remediation Summit 2020 with two TED-talk style keynotes by providing security leader perspective on lawn care, selling jeans and managing business risk through vulnerability remediation.

    Andy, Steve and Steve's cat focus on the criticality of focus in vulnerability management programs and how vulnerability remediation can reduce risk while driving business outcomes.

    Be like Steve's cat and join the Vulcan Cyber community at https://vulcan.io/community and start using Vulcan Remedy Cloud today for free at https://vulcan.io/remedy-cloud.
  • Get Fix Done with Risk-Based Vulnerability Prioritization Recorded: Jan 5 2021 22 mins
    Amber Smith, Snowflake cybersecurity & data governance professional | Tal Morgenstern, Vulcan Cyber CPO
    Amber Smith, Snowflake cybersecurity & data governance professional, and Tal Morgenstern, Vulcan Cyber CPO & co-founder, will share how to reduce business risk by using Vulcan custom risk scripts and more to prioritize vulnerabilities for your business' unique digital infrastructure.
  • Vulnerability Remediation Orchestration in Action Recorded: Dec 17 2020 40 mins
    Yaniv Bar-Dayan, Vulcan Cyber CEO
    Vulnerability management programs exist first and foremost to drive desired business outcomes, and second to reduce business risk. But vulnerability management must be done right to have the desired effect on the business.

    Join Vulcan Cyber CEO, Yaniv Bar-Dayan, as he outlines the maturity model for vulnerability remediation designed to move security and IT operations teams from reactive to data-driven, and from orchestrated to transformed. Then Yaniv will provide a live demonstration of the Vulcan Cyber vulnerability remediation orchestration platform in action.

    All attendees receive a free copy of The Vulnerability Remediation Maturity Model eBook. Join us.
  • Remediation Analytics - Measuring Outcomes from Scan to Fix Recorded: Dec 14 2020 27 mins
    Noam Slomianko, Vulcan Cyber development team lead; Dan Katz, Vulcan Cyber solution architect
    In an ideal world, vulnerability management programs exist first to drive desired business outcomes, and second to reduce business risk. But it isn’t easy to go from vulnerability management to vulnerability remediation. Thousands of moving parts must be orchestrated and measured to have the desired effect. It’s impossible to tell if you got fix done, if you can’t measure fix in the first place.

    Watch this breakout session from The Remediation Summit and learn from Noam Slomianko, Vulcan Cyber development team lead, and Dan Katz, Vulcan Cyber solution architect, as they demonstrate how Vulcan Cyber supports every phase of a mature vulnerability remediation program. Vulcan Cyber built the remediation orchestration platform to work with existing vulnerability management tools and, most importantly, to measure the effectiveness of remediation campaigns and remediation outcomes such as risk reduction, compliance attainment, MTTF (mean-time-to-fix), and more.
  • Easy Remedies for Your Top Vulnerabilities Recorded: Oct 29 2020 20 mins
    Chen Aperman, Vulcan Cyber product manager; Ortal Keizman, Vulcan Cyber research team lead
    Most vulnerability management teams are doing a great job scanning for and prioritizing vulnerabilities. But this is just the first step in an effective vulnerability management program, and arguably the easiest step.

    Vulnerability remediation is a dirty job, and nobody usually likes to do it, especially the IT teams that often shoulder the bulk of remediation work. Watch this webcast and we will provide a first look at a new, free resource that delivers thousands of remedies as a service to bridge the gap between vulnerabilities found, and vulnerabilities fixed.

    Vulcan Remedy Cloud is a new, searchable database of fixes and solutions for the vulnerabilities that pose the biggest risk to your business. Get security and IT operations teams on the same page and get fix done with a curated database of solutions that includes patches, scripts, configuration changes, workarounds, compensating controls and more.

    Join Chen Aperman and Ortal Keizman from Vulcan Cyber as they show you how to use remediation intelligence from Remedy Cloud to find the best fixes for vulnerabilities like Windows Zerologon, and for the most-dangerous Linux vulnerabilities.

    Stop sending IT teams off on a wild fix chase by getting the right remedies to the right teams, right away. Simply finding and prioritizing vulnerabilities is not enough, let’s get fix done.
  • Get fix done with the vulnerability remediation maturity model Recorded: Oct 15 2020 41 mins
    Yaniv Bar-Dayan, Vulcan Cyber CEO
    Vulnerability management programs exist first and foremost to drive desired business outcomes, and second to reduce business risk. But vulnerability management must be done right to have the desired effect on the business.

    Join Vulcan Cyber CEO, Yaniv Bar-Dayan, as he outlines the maturity model for vulnerability remediation designed to move security and IT operations teams from reactive to data-driven, and from orchestrated to transformed. All attendees receive a free copy of The Vulnerability Remediation Maturity Model eBook. Join us.
  • From found to fixed - A day in the life of a security vulnerability Recorded: Oct 1 2020 34 mins
    Nick Vann and Rhett Glauser
    In an ideal world a security vulnerability is found, then fixed as quickly as possible by security and IT operations teams working together to reduce business risk and enforce cyber hygiene. Of course this is much easier said than done.

    Tune into this webcast to see a demonstration of a day in the life of a vulnerability getting fixed by Vulcan Cyber, the only SaaS platform dedicated to orchestrating and automating end-to-end vulnerability remediation. See how Vulcan can be used to get your existing people, processes, and tools working in efficient harmony to secure IT.

    This demo will start with a dashboard view of an organization's cyber posture comprised of data inputs pulled from vulnerability scanners like Tenable and asset repositories like ServiceNow. We will then show how Vulcan is used to prioritize vulnerability risk for your specific business. Once prioritized, the demo will show how Vulcan provides intelligent remedies such as patches, configuration change scripts, or workarounds for vulnerabilities reducing the research burden on security and IT operations teams. Vulcan is then integrated with tools like Jira used to orchestrate change management processes and work routing across teams, ultimately integrating with patch and configuration management tools like Ivanti or Ansible to automate remediation at scale.

    Join us, to see for yourself how the Vulcan platform orchestrates vulnerability remediation through:
    - Vulnerability risk prioritization
    - The best vulnerability remedies and solutions as a service
    - Cross-functional work orchestration and process automation
    - Efficient remediation through automation at scale
    - Integration with your existing tools, and support for your current teams and process investments
  • A mature vulnerability management program helps sell more jeans Recorded: Sep 17 2020 48 mins
    Steve Zalewski, Levi Strauss & Co. deputy CISO; Yaniv Bar-Dayan, Vulcan Cyber CEO
    Vulnerability management programs exist to drive desired business outcomes. Period. In the case of Levi Strauss & Co. the desired business outcome is to sell more of the world's original jeans. Tune into this Vulcan Cyber webinar to learn what keeps Steve Zalewski, Levi Strauss & Co. deputy CISO, up at night in as he and the security team diligently work to sell more jeans.

    For Steve the priority is to reduce business risk. More than zero trust or even hybrid cloud security, vulnerability remediation (not just vulnerability management) tops his list of security programs that must be done right to support business outcomes and reduce business risk.

    Steve will be joined by Vulcan Cyber CEO, Yaniv Bar-Dayan, as they discuss a maturity model for vulnerability remediation designed to move security and IT operations teams from reactive to data-driven, from orchestrated to transformed. Learn from these industry experts what it takes to succeed through secure business.
  • The Vulnerability Report - Episode 2: Critical Slack and Cisco Vulnerabilities Recorded: Sep 9 2020 20 mins
    Tal Morgenstern, Vulcan CPO; Yonatan Amitay, Vulcan security engineer
    Join us on this episode of The Vulnerability Report webcast series for unique insights into the latest infrastructure and application vulnerabilities threatening your digital business.

    On this episode we will dive into the new critical Slack and Cisco vulnerabilities, and provide the best remedies and solutions for each.

    We promise we won't just read the CVE to you. Instead we run the research and do the work to provide you with useful tips, tricks, best solutions and remedies. We're focused on vulnerability remediation...not just vulnerability management.
  • A Demonstration of Vulnerability Remediation Orchestration In Action Recorded: Aug 20 2020 33 mins
    Nick Vann and Rhett Glauser
    Vulnerability scanning is easy. Vulnerability remediation is hard. Tune into this webcast to see the only SaaS platform dedicated to orchestrating and automating end-to-end vulnerability remediation. See how Vulcan can be used to get your existing people, processes, and tools working in efficient harmony to secure IT.

    This demo will start with a dashboard view of an organization's cyber hygiene posture comprised of data inputs pulled from vulnerability scanners like Tenable and asset repositories like ServiceNow. We will then show how Vulcan is used to prioritize vulnerability risk for your specific business. Once prioritized, the demo will show how Vulcan provides intelligent remedies such as patches, configuration change scripts, or workarounds for vulnerabilities reducing the research burden on security and IT operations teams. Vulcan is then integrated with tools like Jira used to orchestrate change management processes and work routing across teams, ultimately integrating with patch and configuration management tools like Ivanti or Ansible to automate remediation at scale.

    Join us, to see for yourself how the Vulcan platform delivers:
    - Vulnerability risk prioritization
    - The best vulnerability remedies and solutions as a service
    - Cross-functional work orchestration and process automation
    - Efficient remediation through automation at scale
    - Integration with your existing tools, and support for your current teams and process investments
  • Data-Driven Vulnerability Management in a Data-Centric World Recorded: Aug 13 2020 45 mins
    Amber Smith, Snowflake Security Data Governance; Omer Singer, Snowflake Cyber Security Strategy, Nevo Laron, Vulcan
    Securing data isn't easy...especially not at enterprise scale. But this is exactly what Amber Smith and Omer Singer are charged to do for Snowflake, the cloud data platform used today by more than 3400 forward-looking enterprise organizations.

    Running security and governance for the Snowflake data cloud is challenging but in this webinar we'll learn from two experts who get the job done. Omer and Amber will share why businesses trust Snowflake to handle the optimization, availability, protection, and security of their data so they can focus on using the data, not managing and securing it.

    Amber will also provide insights into the Snowflake vulnerability management program and share why they chose the Vulcan platform for vulnerability remediation orchestration as a critical component of any successful security and governance effort. Attend this webinar and learn what goes into creating a secure data cloud, and learn how to take your vulnerability management program to advanced levels of maturity with cohesive processes that span from vulnerability scan to fix.
  • The Vulnerability Report - Episode 1 Recorded: Aug 6 2020 18 mins
    Ortal Keizman, Vulcan Cyber research team lead; Yonatan Amitay, Vulcan Cyber security engineer
    Join members of the Vulcan Cyber research team on this episode of The Vulnerability Report webcast series for unique insights into the latest infrastructure and application vulnerabilities threatening your digital business.

    We promise we won't just read the CVE to you. Instead we run the research and do the work to provide you with useful tips, tricks, best solutions and remedies for the vulnerabilities that matter. We're focused on vulnerability remediation...not just vulnerability management. Together we can get fix done to secure IT.

    On this episode we will dive into the SIGRed and BootHole vulnerabilities for starters, and provide the best remedies and solutions for each.
  • Aligning vulnerability prioritization with business impact & risk quantification Recorded: Jul 23 2020 46 mins
    Sounil Yu, former Bank of America chief security scientist; Yaniv Bar-Dayan, Vulcan Cyber CEO
    The approach most cyber security organizations use today to do vulnerability prioritization is inefficient at best, dangerous at worst. It's time to do vulnerability remediation the right way by prioritizing what matters to the business.

    Join Sounil Yu, former Bank of America chief security scientist and YL Ventures CISO in residence, and Yaniv Bar-Dayan, Vulcan Cyber CEO and co-founder, to learn why aligning vulnerability prioritization with business impact and risk quantification is essential for modern vulnerability management programs.

    Risk-based vulnerability prioritization has become a necessary practice, but most companies rely on models that only incorporate the severity of the vulnerability. Systematic, automated inclusion of business impact and risk quantification in prioritization models makes vulnerabilities relevant to the business and creates substantial efficiencies in the remediation process.

    Join us to learn how the new, customizable Vulcan Cyber risk model helps security and IT operations teams prioritize vulnerabilities based on business impact and risk tolerance for targeted, efficient remediation.
Vulnerability Remediation Orchestration
Vulcan Cyber is the world's first continuous vulnerability remediation platform. Entirely focused on remediation, not just vulnerability management, we help enterprise security and IT teams collaborate to get fix done by orchestrating and automating the full remediation lifecycle. Vulcan reduces business exposure to vulnerability dwell from months to hours by providing actionable prioritization, the right remedy for the task, and automation of the entire workflow.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: From found to fixed - A day in the life of a security vulnerability
  • Live at: Oct 1 2020 5:00 pm
  • Presented by: Nick Vann and Rhett Glauser
  • From:
Your email has been sent.
or close