Hi [[ session.user.profile.firstName ]]

How HBO Max and Snowflake deliver customer-centric cybersecurity

Watch the last three keynotes from The Remediation Summit 2020 delivered by Yaniv Bar-Dayan, Vulcan Cyber CEO, Brian Lozada, HBO Max security leader, and Omer Singer, Snowflake head of cyber security strategy.

These keynotes provide insights on delivering customer-centric security and the intersection of vulnerability management and data security.

Keep watching for the final keynote in which Yaniv announces the availability of Vulcan Remedy Cloud and Vulcan remediation analytics as two new vulnerability remediation orchestration services from Vulcan Cyber.

Join the Vulcan Cyber community at https://vulcan.io/community and start using Remedy Cloud today for free at https://vulcan.io/remedy-cloud
Recorded Jul 29 2021 25 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Yaniv Bar-Dayan, Vulcan Cyber CEO | Brian Lozada, HBO Max security leader | Omer Singer, Snowflake head of cyber strategy
Presentation preview: How HBO Max and Snowflake deliver customer-centric cybersecurity

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Hiding In Plain Sight - An Untapped Path to Cloud Security Nov 4 2021 3:00 pm UTC 20 mins
    Yaniv Bar-Dayan
    It's no news that security is a top barrier when migrating to the cloud. Therefore, all major cloud providers now offer native vulnerability scanning and security services for free or for lower costs to help their customers identify potential cloud security issues.

    Attend this session to learn the changing ecosystem of cloud environments, and how this embedded security trend can impact your cloud security program decisions. This presentation was originally featured at CSA Continuous, October 2021.
  • The Top Mistakes in Cloud Security and How to Avoid Them Oct 28 2021 3:00 pm UTC 33 mins
    Yaniv Bar-Dayan, Vulcan Cyber CEO and co-founder
    Gartner Research recently predicted that “through 2025, more than 99% of cloud breaches will have a root cause of customer misconfigurations or mistakes.” Now that we know where we should focus our efforts to secure the enterprise cloud services we use, we should be able to move quickly to address mistakes and mitigate risk. Right?

    It's never that easy. But if we understand where our cloud security weaknesses exist and if we effectively prioritize risk and mitigate self-induced vulnerabilities, we'll be way ahead of the game.

    Cloud security is almost never the cloud service provider's problem and the sooner we take responsibility for the security of our cloud application infrastructure, the quicker we can mitigate risk.

    Unfortunately, cyber security initiatives too often fall short of objectives to actually secure cloud infrastructure. Lots of scanning and configuration checks, but not a lot of mitigation and remediation. There are so many moving parts in modern cloud application infrastructure, with dozens of stakeholders, and a crush of vulnerabilities and misconfigurations that are growing exponentially.

    Join Yaniv Bar-Dayan, Vulcan Cyber co-founder and CEO, to learn from the top mistakes we've seen time and again in enterprise cloud security. Join us to learn about:

    • The top five mistakes in cloud security.
    • How to avoid these mistakes.
    • The latest native AWS, Azure, and Google Cloud security tools available today to help you enforce cyber hygiene across your multi-cloud surfaces.
  • Understanding Your IT Risk Management Ecosystem Oct 27 2021 5:00 pm UTC 62 mins
    Sarah Peters, InformationWeek editor in chief | Yaniv Bar-Dayan, Vulcan Cyber CEO | John Pironti, IP Architects president
    With cyber attacks on the rise, having proper cyber hygiene and security basics are essential. If companies could just get the basics right, most of these attacks would be stopped. But doing well at the fundamentals is easier said than done. What are these top "cyber hygiene" priorities that make the biggest difference to security, and what tools/techniques can help enterprises get these things right?

    Attend this webinar and you'll learn:
    - How to embrace dirty jobs like patch and password management
    - Ways to get from "finding" security vulnerabilities to "remediating" them more quickly and efficiently
    - What should get top billing in your employees' security training
    - Which tools and techniques make tidying up easier
  • Understanding Your IT Risk Management Ecosystem Recorded: Oct 8 2021 62 mins
    Sarah Peters, InformationWeek editor in chief | Yaniv Bar-Dayan, Vulcan Cyber CEO | John Pironti, IP Architects president
    With cyber attacks on the rise, having proper cyber hygiene and security basics are essential. If companies could just get the basics right, most of these attacks would be stopped. But doing well at the fundamentals is easier said than done. What are these top "cyber hygiene" priorities that make the biggest difference to security, and what tools/techniques can help enterprises get these things right?

    Attend this webinar and you'll learn:
    - How to embrace dirty jobs like patch and password management
    - Ways to get from "finding" security vulnerabilities to "remediating" them more quickly and efficiently
    - What should get top billing in your employees' security training
    - Which tools and techniques make tidying up easier
  • The Top Mistakes in Cloud Security and How to Avoid Them Recorded: Oct 8 2021 33 mins
    Yaniv Bar-Dayan, Vulcan Cyber CEO and co-founder
    Gartner Research recently predicted that “through 2025, more than 99% of cloud breaches will have a root cause of customer misconfigurations or mistakes.” Now that we know where we should focus our efforts to secure the enterprise cloud services we use, we should be able to move quickly to address mistakes and mitigate risk. Right?

    It's never that easy. But if we understand where our cloud security weaknesses exist and if we effectively prioritize risk and mitigate self-induced vulnerabilities, we'll be way ahead of the game.

    Cloud security is almost never the cloud service provider's problem and the sooner we take responsibility for the security of our cloud application infrastructure, the quicker we can mitigate risk.

    Unfortunately, cyber security initiatives too often fall short of objectives to actually secure cloud infrastructure. Lots of scanning and configuration checks, but not a lot of mitigation and remediation. There are so many moving parts in modern cloud application infrastructure, with dozens of stakeholders, and a crush of vulnerabilities and misconfigurations that are growing exponentially.

    Join Yaniv Bar-Dayan, Vulcan Cyber co-founder and CEO, to learn from the top mistakes we've seen time and again in enterprise cloud security. Join us to learn about:

    • The top five mistakes in cloud security.
    • How to avoid these mistakes.
    • The latest native AWS, Azure, and Google Cloud security tools available today to help you enforce cyber hygiene across your multi-cloud surfaces.
  • Top Mistakes Everybody Makes in Vulnerability Management and How to Avoid Them Recorded: Aug 5 2021 26 mins
    Yaniv Bar-Dayan, Vulcan Cyber co-founder and CEO
    Vulnerability management initiatives too often fall short of the objective to secure digital infrastructure. Lots of scanning and vulnerability prioritization, but not a lot of actual remediation. Admittedly, moving from simple vulnerability management to deliberate vulnerability remediation isn’t easy. There are so many moving parts, with dozens of stakeholders, and a crush of infrastructure with related vulnerabilities growing exponentially.

    Join Yaniv Bar-Dayan, Vulcan Cyber co-founder and CEO, to learn how to avoid the top five mistakes everybody is making in vulnerability management. You’ll also learn:
    • The top five mistakes in vulnerability management.
    • How you can avoid these mistakes by shifting the objectives from vulnerability management to vulnerability remediation.
    • How the Vulcan Cyber platform can help your team get fix done through scan-to-fix vulnerability remediation orchestration.
  • Intelligence-Led Vulnerability Remediation Recorded: Aug 5 2021 21 mins
    Matt Shelton, FireEye Director of Threat and Vulnerability
    A highlight from The Remediation Summit 2021, watch this case study presented by FireEye, a Vulcan Cyber customer. Learn how FireEye prioritizes remediation efforts using Vulcan Cyber remediation campaigns and workflow orchestration. In an effort to address diverse and growing threats like an increase in zero-days threats, see how the FireEye internal cyber security team was able to achieve and measure 100% remediated status for a group of critical business assets.
  • CISO Perspectives on Continuous Security and Risk Analytics Recorded: Aug 3 2021 22 mins
    Jack Leidecker, Gong CISO
    A highlight from The Remediation Summit 2021, this keynote conversation between Jack Leidecker, Gong CISO, and Yaniv Bar-Dayan, Vulcan Cyber CEO and co-founder, dives into the unique cyber security challenges facing the world's leading revenue intelligence service. Jack provides insights into Gong's advanced approach to defending against emerging threats and staying ahead of a non-stop crush of security vulnerabilities. Learn how continuous security combined with a keen eye on risk analytics allows the Gong security team to keep pace with the CI / CD approach to application development employed by the Gong DevOps teams.
  • How HBO Max and Snowflake deliver customer-centric cybersecurity Recorded: Jul 29 2021 25 mins
    Yaniv Bar-Dayan, Vulcan Cyber CEO | Brian Lozada, HBO Max security leader | Omer Singer, Snowflake head of cyber strategy
    Watch the last three keynotes from The Remediation Summit 2020 delivered by Yaniv Bar-Dayan, Vulcan Cyber CEO, Brian Lozada, HBO Max security leader, and Omer Singer, Snowflake head of cyber security strategy.

    These keynotes provide insights on delivering customer-centric security and the intersection of vulnerability management and data security.

    Keep watching for the final keynote in which Yaniv announces the availability of Vulcan Remedy Cloud and Vulcan remediation analytics as two new vulnerability remediation orchestration services from Vulcan Cyber.

    Join the Vulcan Cyber community at https://vulcan.io/community and start using Remedy Cloud today for free at https://vulcan.io/remedy-cloud
  • The future of cyber hygiene and risk remediation #TRS121 Recorded: Jul 28 2021 12 mins
    Yaniv Bar-Dayan, Vulcan Cyber CEO and co-founder
    Yaniv Bar-Dayan, Vulcan Cyber CEO and co-founder, shares his vision for the future of cyber hygiene and risk remediation in this keynote from The Remediation Summit 2021.
  • The Remediation Summit 2021 #TRS121 Recorded: Jul 24 2021 104 mins
    Jack Leidecker, Gong CISO / Matt Shelton, FireEye Director of Threats and Vulnerabilities / Bala Venkat, Wipro Ventures Cyber
    The Remediation Summit 2021 presents the leading minds, best practices and technologies in risk remediation. Join us and learn how to get fix done starting with risk-driven vulnerability prioritization.

    Learn how cyber security innovators from Gong, FireEye, Wipro, and Vulcan Cyber drive remediation outcomes with unique risk prioritization modeling and asset health scoring for IT, application and cloud environments.
  • Vulcan Risk Analytics overview and demo #TRS121 Recorded: Jul 23 2021 22 mins
    Tal Morgenstern, Vulcan Cyber CPO and co-founder
    See a demo and overview of the new Vulcan Risk Analytics module in this technical deep dive session from The Remediation Summit 2021.
  • Vulcan Cloud Security overview and demo #TRS121 Recorded: Jul 23 2021 12 mins
    Tal Morgenstern, Vulcan Cyber CPO and co-founder
    See a demo and overview of the new Vulcan Cloud Security module in this technical deep dive session from The Remediation Summit 2021.
  • Wipro VMaaS for vulnerability remediation orchestration #TRS121 Recorded: Jul 23 2021 9 mins
    Bala Venkat, Wipro Ventures global cybersecurity head
    Vulnerability management extends beyond servers and hosts to cloud-native environments with virtual machines running on multi-cloud platforms, container images, storage, and network infrastructure. To mitigate risk, vulnerability management must go beyond traditional discovery and scan. It must connect to the various tools in the infrastructure, ingest scan and asset data, apply remediation intelligence, and orchestrate the prioritization, ticketing, analysis, and remediation processes in support of strong SLAs.

    Watch this on-demand presentation from The Remediation Summit by Bala Venkat, Wipro Ventures Head, to understand how the Wipro Vulnerability Management as a Service offering combined with Vulcan Cyber platform can help your company reduce risk through expert services and orchestrated vulnerability remediation.
  • CISO Perspectives on continuous security and risk analytics #TRS121 Recorded: Jul 22 2021 22 mins
    Jack Leidecker, Gong CISO
    A highlight from The Remediation Summit 2021, this keynote conversation between Jack Leidecker, Gong CISO, and Yaniv Bar-Dayan, Vulcan Cyber CEO and co-founder, dives into the unique cyber security challenges facing the world's leading revenue intelligence service. Jack provides insights into Gong's advanced approach to defending against emerging threats and staying ahead of a non-stop crush of security vulnerabilities. Learn how continuous security combined with a keen eye on risk analytics allows the Gong security team to keep pace with the CI / CD approach to application development employed by the Gong DevOps teams.
  • Using Vulcan Cyber for intelligence-led vulnerability remediation #TRS121 Recorded: Jul 22 2021 21 mins
    Matt Shelton, FireEye Director of Threat and Vulnerability
    A highlight from The Remediation Summit 2021, watch this case study presented by FireEye, a Vulcan Cyber customer. Learn how FireEye prioritizes remediation efforts using Vulcan Cyber remediation campaigns and workflow orchestration. In an effort to address diverse and growing threats like an increase in zero-days threats, see how the FireEye internal cyber security team was able to achieve and measure 100% remediated status for a group of critical business assets.
  • Reduce Security Risk, Prioritize Remediation with IT Asset Compliance KPIs Recorded: Jun 24 2021 46 mins
    Tal Morgenstern, Vulcan Cyber CPO; Navot Yellin, Vulcan Cyber product manager
    Enterprise IT security organizations are scrambling to protect their businesses from a growing threat of data theft and ransomware attacks. Little can be done post breach, and scare resources must be prioritized now to proactively reduce business risk by protecting your most valuable IT assets.

    Attend this webinar to learn about a new approach to risk and vulnerability prioritization and remediation. The Vulcan Cyber risk model has been updated to help IT security teams to measure risk compliance via IT asset health scores across logical business groupings. For the first time ever, enterprise cyber security teams can measure business risk against customizable security compliance KPIs while using these same KPIs to prioritize and orchestrate vulnerability remediation resources. See how risk can be reduced, and compliance attained, for the business IT assets that matter most. Track the progress of remediation campaigns from scan-to-fix as IT security teams address prioritized risks to protect your business from bad actors.

    Join us to see an overview and demo of:
    - A risk-compliant asset KPI as the driving measure underpinning remediation campaign priority.
    - A consolidated view of asset health based on vulnerability criticality and asset priority.
    - Customizable risk parameters and weighted vulnerability prioritization scores specific to your business' IT asset data.
    - More than just scan and prioritize, but full risk remediation orchestration.
  • A Live Demo of Risk-Driven Vulnerability Prioritization in Action Recorded: Jun 22 2021 30 mins
    Dan Katz, Vulcan Cyber director of solution engineering
    Effective vulnerability remediation isn't possible without risk-driven vulnerability prioritization. Enterprise IT security teams don't have the bandwidth to stay on top of the constant crush of new vulnerabilities that may create risk specific to your business. The only answer is to focus fix through prioritization, and to reduce fix workloads through automation.

    Join us on this webcast to see a live demo of the SaaS platform built for risk-driven vulnerability prioritization. See how Vulcan Cyber can be used to get your existing people, processes, and tools working in harmony to secure IT.

    This demo will start with a dashboard view of an organization's cyber hygiene posture comprised of data inputs pulled from vulnerability scanners like Tenable, Qualys and Rapid7, and asset repositories like ServiceNow. We will then show how Vulcan Cyber is used to prioritize vulnerability risk for your specific business using threat intelligence feeds and customizable risk scoring tailored to your business. See the asset health score that will help your teams get fix done.

    All webcast attendees will be offered access to their own instance of Vulcan Free, the industry's only free vulnerability prioritization platform.
  • Integrating CI/CD with Risk Remediation for Comprehensive Application Security Recorded: Jun 8 2021 24 mins
    Yaniv Bar-Dayan, Vulcan Cyber CEO and co-founder
    Applications are driving the rapidly transforming digital economy. However, a combination of increased release cycles and application development speed, and an ever-more sophisticated threat landscape riddled with un-remediated, known vulnerabilities is increasing the size of the enterprise attack surface.

    Comprehensive cyber hygiene requires the coordination of remediation efforts across diverse environments including application development, cloud, traditional infrastructure and endpoints. The importance of security cannot be overstated, nor can the difficulty of maintaining application security specifically.

    A security-minded approach to continuous integration and continuous delivery has proven itself extremely useful in securing the software development lifecycle and related software supply chain, both internal and external.

    This session will outline the steps needed to integrate application security and DevSecOps practices with an overarching vulnerability remediation orchestration initiative. It will feature real-world examples using prescriptive workflows that measure and drive holistic enterprise security. This session will also cover:
    - Orchestration best practices, including how to automate application updates and security testing.
    - Dev infrastructure security considerations including patch management.
    - Integration of remediation efforts across diverse environments.
    - Post-test testing.
    - Update and validate container image security.
    - Kubernetes maintenance
  • Enforcing Cyber Hygiene Across Applications, Endpoints and Clouds Recorded: Jun 3 2021 48 mins
    Scott Crawford - 451 Research / Yaniv Bar-Dayan - Vulcan Cyber / Conor Sherman - ezCater / Khanh Tran - CrowdStrike
    Enterprise IT security teams are trying to enforce cyber security across applications, IT endpoints and cloud environments. Complexity is brought on by digital scale and diversity and is increasing exponentially. Add another operating system, cloud or code base to the mix and security becomes even more difficult to enforce. Today complexity is the rule, not the exception.

    Even the simplest of environments still requires at least a dozen different tools to drive meaningful and efficient cyber hygiene. In an ideal world a security vulnerability is found, prioritized, then fixed within days by collaborative security and IT teams working together. This is much easier said than done, especially when these teams each have their own tools dispersed across these diverse environments.

    Register for this roundtable discussion with cyber security veterans to learn how the secure enterprise calibrates its toolset to get fix done. Topics will include:
    - Finding the 'right tool for the right job is a lot more complex than it’s ever been. With distinctions among endpoint, cloud and application tactics – and the disruption of new techniques like DevOps tools and processes – how do organizations cope?
    - Tearing down silos between IT and security teams to get the most out of best-of-breed tools through integration and orchestration.
    - The scale monster is coming. Automate before it eats you.
    - You can’t fix what you can’t measure. Remediation analytics for cyber hygiene success.
Vulnerability Remediation Orchestration
Vulcan Cyber is the world's first continuous vulnerability remediation platform. Entirely focused on remediation, not just vulnerability management, we help enterprise security and IT teams collaborate to get fix done by orchestrating and automating the full remediation lifecycle. Vulcan reduces business exposure to vulnerability dwell from months to hours by providing actionable prioritization, the right remedy for the task, and automation of the entire workflow.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How HBO Max and Snowflake deliver customer-centric cybersecurity
  • Live at: Jul 29 2021 2:00 pm
  • Presented by: Yaniv Bar-Dayan, Vulcan Cyber CEO | Brian Lozada, HBO Max security leader | Omer Singer, Snowflake head of cyber strategy
  • From:
Your email has been sent.
or close