Hi [[ session.user.profile.firstName ]]

The Fast Path to Cyber Hygiene in the COVID-19 Era

Quick-wins to Automate Cyber Defense Validation and Reduce Risk
Today’s remote work reality coupled with increased cyber-attacks have caused an information security ‘seismic wave’. Many organizations seek ways to automate any possible aspect of vulnerability assessment and security validation to support business continuity.

Aite Group conducted research and interviews with numerous security leaders regarding their use of automation to perform control validation. The research included details on strategies to reduce organizational cyber risk.

In this Webinar Aite Group Senior Analyst, Joseph Krull, reviews -

The recent leap in technology that allows for machine-based security validation
The difference between Breach and Attack Simulation (BAS) and Breach and Attack Emulation (BAE)
The desired mix of vulnerability management and penetration testing programs
A case study - a financial services organization’s use of breach and attack emulation to reduce overall cyber risk
Aite Group recommendations for organizations to improve their security testing efforts
Recorded May 21 2020 49 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Joseph Krull, Senior Analyst, Aite Group
Presentation preview: The Fast Path to Cyber Hygiene in the COVID-19 Era

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Top Use Cases for Continuous Security Validation in the Enterprise Recorded: Jun 29 2020 60 mins
    Karl Mattson, CISO & Blake Strozdas, Sales Engineer, Pcysys
    As the attack surface continues to grow and the number of attacks increases, there still remains a gap when it comes to validating the effectiveness and accuracy of the enterprise’s cyber posture.

    In this webinar, Pcysys Sales Engineer, Blake Strozdas, joins CISO, Karl Mattson, to review the path to cyber security validation in the enterprise.

    Join us June 25th to hear -

    Best practices for continuous security control validation
    How to close the gap between policy and practice in the network
    How to increase the productivity of their security teams
    A new approach to risk-based remediation prioritization
  • 4 Use Cases for Continuous Security Testing in the Enterprise Recorded: Jun 12 2020 61 mins
    Steve Armstrong & Steve Bakewell, Pcysys
    The inability to continuously test security controls in the network and prioritize remediation according to business impact remains a challenge for security professionals worldwide.

    Join our webinar, June 10th, to hear how enterprise security executives in the UK:

    Enable secure business continuity on their extended networks
    Continuously validate their cyber defenses with limited on-site access
    Focus remediation only on breachable vulnerabilities
    Regularly challenge their network against the MITRE ATT&CK framework
  • The Fast Path to Cyber Hygiene in the COVID-19 Era Recorded: May 21 2020 49 mins
    Joseph Krull, Senior Analyst, Aite Group
    Quick-wins to Automate Cyber Defense Validation and Reduce Risk
    Today’s remote work reality coupled with increased cyber-attacks have caused an information security ‘seismic wave’. Many organizations seek ways to automate any possible aspect of vulnerability assessment and security validation to support business continuity.

    Aite Group conducted research and interviews with numerous security leaders regarding their use of automation to perform control validation. The research included details on strategies to reduce organizational cyber risk.

    In this Webinar Aite Group Senior Analyst, Joseph Krull, reviews -

    The recent leap in technology that allows for machine-based security validation
    The difference between Breach and Attack Simulation (BAS) and Breach and Attack Emulation (BAE)
    The desired mix of vulnerability management and penetration testing programs
    A case study - a financial services organization’s use of breach and attack emulation to reduce overall cyber risk
    Aite Group recommendations for organizations to improve their security testing efforts
  • Continuous Security Validation - 10 Case Studies in 30 Minutes Recorded: May 19 2020 53 mins
    Aviv Cohen, CMO, Pcysys
    The increase in remote workforce is extending the corporate “edge” to include the homes of employees, adding personal devices and networks to an already complex environment.

    Join our webinar to hear how enterprise security executives globally leverage the platform to:

    Secure their remote extended networks
    Continuously validate their cyber defenses with zero on-site access
    Focus remediation only on breachable vulnerabilities
    Regularly challenge their network against the MITRE ATT&CK framework
  • Remote Penetration Testing Services During Lock-down Recorded: May 12 2020 55 mins
    Amiati Razton, CEO, Pcysys
    Deliver remote automated penetration testing projects, with higher profit margins, with your existing team

    In this webinar, Pcysys CEO, Amitai Ratzon discusses how you can now provide a more competitive, continuous and profitable network penetration testing service, especially in times of physical access limitations.

    Your Takeaways:

    Provide penetration testing services instantly from anywhere in the world
    Increase your penetration testing productivity and margin
    The easy path of integrating automation into your service offering
    Help your customers grow a stronger security posture in the remote workforce era
  • A CISO's Take on Continuous Security Validation Recorded: May 10 2020 56 mins
    Karl Mattson, CISO
    Technologies and best practices in cyber security control validation

    The inability to continuously test security controls in the network and prioritize remediation according to business impact remains a challenge for security professionals worldwide.

    In this webinar, Karl Mattson, CISO, will review:

    Best practices for continuous security control validation
    Closing the gap between policy and practice in the network
    How to enable your security team to be more productive
    A new approach to risk-based remediation prioritization
  • PenTera Explained Without Words - The Mime Who Zoombombed Our Webinar Recorded: May 7 2020 4 mins
    Aviv Cohen, CMO, Pcysys
    In these unique time of remote work, securing the organizational network has become a challenge. To always stay ahead and constantly have visibility to what's happening, you can't do without continuous security validation. The Mime artist, Dani Aragon, explains.
  • A CISO's 10 Minutes on the Importance of Continuous Security Validation Recorded: Mar 17 2020 10 mins
    Amitai Ratzon, Pcysys CEO & Karl Mattson, former CISO, City National Bank
    Pcysys CEO Amitai Ratzon, sits down with former City National Bank CISO, Karl Mattson, to discuss the increasing need to continuously test cyber security controls and this activity’s place in the enterprise security program.

    In this discussion, Karl shares how he integrated the automated penetration testing platform, PenTera, in his network and how it differs from breach and attack simulation products.
  • What is PenTera for you? Recorded: Mar 10 2020
    Karl Mattson, former CISO, City National Bank
    Karl Mattson, former CISO, City National Bank shares how the Automated Penetration testing platform, PenTera enabled the increase team productivity, complete network visibility and the growth of the organization's cyber resilience. Join us March 17th for the full interview!
  • The Benefits of Using Automated Pentesting Recorded: Mar 5 2020
    Karl Mattson, former CISO, City National Bank
    Karl Mattson, former CISO, City National Bank explains the benefits in using automated penetration testing to validate security controls. Join us for the full interview March 17th!
  • How Does Automated Pentesting Fit into a CISO's Strategy? Recorded: Mar 3 2020
    Karl Mattson, former CISO, City National Bank
    Karl Mattson, former CISO, City National Bank explains how continuous security through Automated Pentesting fits into a CISO's strategy. Join us for the full interview March 17th!
  • Why attack simulation is insufficient Recorded: Feb 27 2020
    Karl Mattson, former CISO, City National Bank
    Karl Mattson, former CISO, City National Bank explains why attack simulation isn't enough when defending the IT network in today's threatscape. Join us for the full interview March 17th!
  • 1-2-1 Interview - PCYSYS, Cybertech Tel Aviv 2020 Recorded: Feb 4 2020 8 mins
    Amitai Ratzon, CEO
    PCYSYS, Cybertech Tel Aviv 2020
    1-2-1 Interview - Amitai Ratzon, CEO
  • Achieving Continuous Security Testing in 2020 Recorded: Dec 16 2019 21 mins
    Sivan Harel, Region Sales Director Nordics and Israel
    Sivan Harel presents the huge leap in technology which now enables automated network penetration testing.

    Your Takeaways:

    A fresh approach to risk-based vulnerability remediation prioritization
    How to ensure your security posture is kept 24/7 in an ever-changing IT network
    Closing the gap between policy and practice in your network
    How to leverage your team to do more to improve your cyber resilience
  • Blackstone CISO Fireside Chat: The Importance of Automating Security Validation Recorded: Dec 5 2019 25 mins
    Amiati Razton, CEO of Pcysys & Adam Fletcher, CISO of Blackstone
    Pcysys CEO Amitai Ratzon, sits down with Blackstone CISO, Adam Fletcher, to discuss the increasing need to automate security validation and this activity’s place in the enterprise security program.

    In this discussion, Adam will share the reasons for backing the automated penetration testing platform, PenTera with funding, after running it on their network and how it differs from breach and attack simulation products.
  • Continuous Testing for Top Hacking Techniques in 2020 Recorded: Nov 11 2019 50 mins
    Alex Spivakovski, Head of Research & Aviv Cohen, CMO at Pcysys
    We’ve all heard of the increasing sophistication of the threatscape, that attackers have the top malicious tools at their disposal to run havoc in any network they deem worthy. But what does that really mean? And how does it affect your network and cyber defense strategy?

    Join Pcysys Head of Research, Alex Spivakovski, for a live demonstration of some of the top hacking techniques threatening enterprises today and how to test for them. See how the smallest misconfigurations in the network can lead to catastrophic outcomes or be remediated with ease. This is an opportunity to get acquainted with the evolving world of continuous cyber testing.

    Some of the topics we’ll cover:

    1. Live demonstration of top hacking techniques threatening enterprises today
    2. Top breachable vulnerabilities in 2019 and how to reveal them in your network
    3. A sustainable way to incorporate automation in your security validation practice to stay one step ahead of the attackers
Build Cyber Relience
Pcysys delivers PenTera™, the automated penetration-testing platform, that assesses and reduces corporate cybersecurity risk. The platform is run remotely on the Cloud or on-site to identify, analyze and focus remediation efforts on breachable vulnerabilities. Hundreds of security professionals and service providers around the world use PenTera to perform continuous machine-based penetration tests that improve their immunity against cyber attacks across their organization networks.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Fast Path to Cyber Hygiene in the COVID-19 Era
  • Live at: May 21 2020 12:30 pm
  • Presented by: Joseph Krull, Senior Analyst, Aite Group
  • From:
Your email has been sent.
or close