InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Live Demo - Security Controls Efficacy - January 18th 2022

Presented by

Arien Seghetti, Solutions Architect

About this talk

On average, organizations have between 30 to 40 security controls and they apply changes to these controls on a weekly basis. According to a Ponemon survey, only 22 percent of respondents say they are highly confident that their organizations’ security controls are working as they are supposed to. In this Live Demo, you will learn how Cymulate automates security control validation enabling frequent and thorough security control optimization. We will also address the following: - Validate policy enforcement/drift - Validate policy effectiveness (is the policy correct?) - Minimize the attack surface - Validate security solution updates (AV/WAF/WG/WSG Signature)
Cymulate Exposure & Security Validation

Cymulate Exposure & Security Validation

16889 subscribers125 talks
Security Validation and Threat Exposure Management
Cymulate exposure management and security validation drives continuous threat exposure management programs and supports both the technical and business requirements of scoping, discovery, prioritization, validation, and mobilization.
Related topics