InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Webinar - Five Questions to Ask as You Deploy Security Posture Management

Presented by

Dave Klein, Cybersecurity Evangelist Director and Dr. Ed Amoroso, CEO & Founder of TAG Cyber, LLC.

About this talk

Join our panel of industry experts as they share insights into five key questions that need to be asked by enterprise teams as they deploy security posture management. The questions specifically are as follows: 1) Definition of Security Posture Management – What specifically do we mean by security posture management? What are the requirements? 2) Applicability of Security Posture Management – Does security posture management apply in every sector and size? Or is this a technique for larger companies only? 3) What to Call the Method – What is the correct nomenclature for security posture management? Is it the same as attack surface management? 4) Security Tool Replacement – Can security posture replace any existing security tools or methods? Can it replace penetration testing? 5) Motivation for the Technique – What drives security posture management? Compliance? Reduction of risk? All of the above? The panelists will share their unique insights in security posture management, with case studies derived from experience across a range of different industries, sectors, and application areas. About Dr. Ed Amoroso: Dr. Ed Amoroso is the CEO and Founder of TAG Cyber, LLC. An NYU professor and former AT&T executive, Ed started TAG Cyber in 2016 to democratize research and advisory services. Business Insider tapped him as one of the country’s 50 leaders “who helped lead the cyber security industry."
Cymulate Exposure & Security Validation

Cymulate Exposure & Security Validation

16893 subscribers125 talks
Security Validation and Threat Exposure Management
Cymulate exposure management and security validation drives continuous threat exposure management programs and supports both the technical and business requirements of scoping, discovery, prioritization, validation, and mobilization.
Related topics