Hi [[ session.user.profile.firstName ]]

Live: Automating Cyber Risk & Compliance Management with CyberStrong

CyberSaint’s CyberStrong platform is disrupting the legacy GRC market with unprecedented assessment automation and agility as the only purpose-built integrated risk management platform for cybersecurity programs. CyberStrong’s patented natural language processing and machine learning technology are factors for the company's recent Gartner Cool Vendor designation, among others. At an industry level, there is currently a lack of best practice for mapping real-time telemetry into control environments, but CyberSaint is making progress in this area, making it accessible to customers from fortune 50 titans to mid-sized companies across the globe. Customers use CyberStrong to manage, measure and communicate their cybersecurity program performance in line with risk, compliance, and organizational objectives.

CyberSaint’s mission is to empower all organizations to build a cybersecurity program that is as clear, actionable, and measurable as any other business function. Teams and executives across information security and beyond use CyberSaint’s CyberStrong platform to build cybersecurity resilience across risk and compliance programs with agility and alignment. Customers communicate cybersecurity program posture, value, and return on security investment from a trusted single system of record that adds advanced automation to risk and compliance assessments and programs. Organizations across the Fortune 500 and high-growth startups alike are empowered to simplify even the most extensive continuous compliance and risk projects and achieve remarkable results.
Recorded Nov 5 2020 25 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Steve Torino, Principal Solutions Architect
Presentation preview: Live: Automating Cyber Risk & Compliance Management with CyberStrong

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Why It is Essential to Have Business Representation on Cyber/IT Risk Committees Sep 15 2021 3:00 pm UTC 45 mins
    Boris Khazin, Global Head of DRM/GRC, EPAM | Hayley Pruett, Senior Customer Advisor, CyberSaint Security
    According to Gartner, in 2019 risk committees with business and IT personnel dropped by 27% while IT-only risk committees saw a 36% increase. In this talk, we dive into why the lack of business representation on these committees poses challenges for both technical and business stakeholders as well as poses a threat to the enterprise at large.
  • How Colonial and JBS will Impact the CMMC Rollout Sep 7 2021 5:00 pm UTC 45 mins
    Angela Dingle, President & CEO, Ex-Nihilo Management | Bob Delfin, Senior Sales Engineer, CyberSaint Security
    Even during its inception, the Cybersecurity Maturity Model Certification was touted as having the potential to be rolled out across all aspects of the federal government beyond just the DIB. As we look to the current administration’s reaction to the Colonial and JBS attacks, are we starting to see that promise realized? Join us as we dive into how the most recent slew of ransomware attacks is impacting (and possibly accelerating) CMMC rollout.
  • How to React When a Competitor is Hit by Ransomware Aug 26 2021 5:30 pm UTC 45 mins
    Carmen Garibi, Director of Business Development, 1898 & Co. | Stephanie Lutz, Customer Success Manager, CyberSaint Security
    In the digital age, a cyber event is not a matter of if, it’s a matter of when but what happens when it doesn’t happen to you? Join us as we dive into some key conversations to have and talking points to bring in the wake of a competitor’s cyber attack.
  • Why the Convergence of IT & OT Will Drive the Next Wave of Regulation for Energy Aug 12 2021 5:00 pm UTC 45 mins
    Madison Horn, Global Cyber Portfolio Lead, Seimens Energy | Hayley Pruett, Senior Customer Advisor, CyberSaint Security
    Across multiple critical infrastructure sectors, we are seeing massive adoption of smart OT devices and the convergence of IT and OT. However, regulations in energy, water, and others have not caught up. See why this convergence leaves organizations vulnerable and join us as we look to see if the regulation will come before or after another attack. Join CyberSaint Senior Customer Advisor Hayley Pruett and Seimens Energy Global Cyber Portfolio Lead Madison Horn as they dive into the changes coming to the energy sector in the coming months.
  • What Critical Infrastructure can Learn from FinServ, Energy, & Insurance Aug 4 2021 3:30 pm UTC 45 mins
    LaLainya Miles, Client Executive, DOE/NASA/DOS | Bob Delfin, Senior Sales Engineer, CyberSaint Security
    While we are seeing a host of new sectors under attack in recent months, the more standard sectors such as financial services and energy remain relatively unscathed. These industries have been targets of black-hats for decades and as a result, might have a thing or two to teach the rest of the sectors.
  • Why We are Overdue for a National Cyber Risk Register Recorded: Jul 20 2021 25 mins
    Steve Torino, Principal Solutions Architect
    With increased concern over the cybersecurity posture of critical infrastructure, the United States federal government is in the unique position to support the companies in these sectors with the creation of a national cyber risk register. Risk relies on past data to track trends and for too long cyber risk professionals have been limited by lack of data. Now, though, in the wake of the exponential growth of cyber events in 2020 and 2021, the data exists it is simply a matter of who should compile it. In this talk, join CyberSaint Principal Solutions Architect Steve Torino as we dive into why the federal government needs to be the one to do it.
  • The Case for RiskOps Recorded: Jul 14 2021 28 mins
    Hayley Pruett, Senior Customer Advisor
    In this talk, we will explore why in the wake of the pandemic and the attacks on Colonial and JSB organizations in critical sectors should consider establishing a risk operations function. With CyberSaint Senior Customer Advisor Hayley Pruett we will explore the emerging function as well as the core capabilities for RiskOps.
  • How IRM is Merging SecOps and GRC Recorded: Jul 9 2021 15 mins
    Bob Delfin, Senior Sales Engineer
    Organizations for a long time have seen security operations and GRC as discrete functions. While that may have worked previously, as we start to see organizations fold risk into SecOps or even go so far as to adopt RiskOps functions the time has come for these two functions to integrate even further. Join us as we dive into how the rise of integrated risk management is driving the merger of SecOps and GRC.
  • Putting Risk First in Cybersecurity & IRM Adoption Recorded: Jun 25 2021 25 mins
    Hayley Pruett, Senior Customer Advisor | Bob Delfin, Senior Sales Engineer
    As many organizations begin to take a risk-first approach to risk and compliance management, we are increasingly seeing organizations forced to rethink their organizational design and the products they use to support these teams.

    Join CyberSaint Senior Customer Advisor Hayley Pruett and Senior Sales Engineer Bob Delfin as they dive into the organizational and product shifts underway as organizations prepare for the future. In this talk, we'll cover:

    - Why risk-based approaches to cybersecurity program management are essential for the digital age
    - The ripple effects that taking a risk-based approach has on the organization
    - How product needs change in the face of a risk-based approach
  • Adopting a Growth Mindset in Cybersecurity: Advice for CISOs and CEOs Recorded: Jun 15 2021 43 mins
    Padraic O'Reilly, Chief Product Officer and Co-Founder | Deidre Diamond, Founder and CEO, CyberSN
    It's a common train of thought that a CISO is one cyber event away from losing their job. Yet, according to Gartner, the average CISO tenure is three years. Combined with the elevation within the C-suite in the digital age, CISOs need to shift their mindset from being a misunderstood technical leader to an empowered business enabler. CISOs need to transition from a fixed to a growth mindset.

    In this conversation, CyberSaint Chief Product Officer Padraic O'Reilly sits down with CyberSN Founder and CEO Deidre Diamond to discuss the state of play as it relates to the mindset CISOs have today, what needs to change to succeed in the digital era, and how business leaders and Board members can support security leaders adopting a growth mindset.

    - The current state of CISO mentality and why it is limiting business growth
    - Hiring trends and the impact that CISO mental health is having on the market
    - Diversity in security and how that plays a role in the mindset security leaders have
  • How Continuous Control Automation is Solving One of the Biggest Risks in Cloud Recorded: Jun 8 2021 40 mins
    Wyatt Cobb, Founder & CEO, SOFTwarfare | Rashard Young, VP of Government Affairs, SOFTwarfare
    With the shift to cloud technologies, the risk configurations are different. According to Gartner, by 2023, 75% of cloud security failures will result from inadequate management of identities, access, and privileges, up from 50% in 2020. One of the greatest challenges for security managers regarding entitlements is the vast amounts of data related to the humans, programs, and systems that have access to a given instance. While it can prove too much for a single or team of humans to review, AI-powered technologies such as CyberStrong are up to the task.

    Join us as we dive into:
    - How organizations are trying to solve for cloud identity and access management today
    - Predictions on how the rapid adoption of digital technologies and digital transformation initiatives will impact an organization's ability to monitor its cloud instances manually
    - How AI and NLP, among other new technologies, will be able to support and augment human teams for cloud entitlements
  • CyberStrong Webcast: Live Demo of NLP-Backed Cross-mapping Abilities Recorded: Jun 3 2021 17 mins
    Bob Delfin, Senior Sales Engineer
    Join us as we walk through the latest updates to the CyberStrong platform including NLP-backed automated crosswalking for both regulatory frameworks and standards as well as custom frameworks and questionnaires. Never before has a solution been able to map frameworks in seconds with this level of accuracy.
  • Admitting Defeat: When to Know Its Time to Supplement your IT GRC Legacy Systems Recorded: Jun 1 2021 28 mins
    Steve Torino, Principal Solutions Architect
    For many large organizations, balancing the beleaguering process of managing a heavy GRC platform with the past investments in time and money made to stand it up can be challenging. As CISOs of global organizations are finding, these systems are falling short in the slew of new functionality that information security organizations require in today's business environment.

    In this talk, CyberSaint Principal Solutions Architect Steve Torino dives into the stories of those who have come to terms with the need to augment their legacy systems, what they were looking for, the process they took for finding something new, and how they stood the new solution up alongside their existing GRC stack.
  • When to Know Its Time to Supplement your IT GRC Legacy Systems - EMEA Recorded: Jun 1 2021 28 mins
    Steve Torino, Principal Solutions Architect
    For many large organizations, balancing the beleaguering process of managing a heavy GRC platform with the past investments in time and money made to stand it up can be challenging. As CISOs of global organizations are finding, these systems are falling short in the slew of new functionality that information security organizations require in today's business environment.

    In this talk, CyberSaint Principal Solutions Architect Steve Torino dives into the stories of those who have come to terms with the need to augment their legacy systems, what they were looking for, the process they took for finding something new, and how they stood the new solution up alongside their existing GRC stack.
  • When to Know Its Time to Supplement your IT GRC Legacy Systems - APAC Recorded: Jun 1 2021 28 mins
    Steve Torino, Principal Solutions Architect
    For many large organizations, balancing the beleaguering process of managing a heavy GRC platform with the past investments in time and money made to stand it up can be challenging. As CISOs of global organizations are finding, these systems are falling short in the slew of new functionality that information security organizations require in today's business environment.

    In this talk, CyberSaint Principal Solutions Architect Steve Torino dives into the stories of those who have come to terms with the need to augment their legacy systems, what they were looking for, the process they took for finding something new, and how they stood the new solution up alongside their existing GRC stack.
  • Achieving SOC 2 Compliance With CyberStrong - EMEA Recorded: May 27 2021 40 mins
    Steve Torino, Principal Solutions Architect | Nick Norton, Chief Visionary, & Client Champion, Geels Norton
    In this talk, we dive into the process of "eating our own dogfood" and how the CyberSaint team used the CyberStrong Platform to become SOC 2 certified.

    We sit down with SOC audit veterans - CyberSaint Principal Solutions Architect Steve Torino and Nick Norton, Chief Visionary and Client Champion at Geels Norton - to hear about their experiences with SOC audits and the differences they saw when using the CyberStrong platform versus other methods.
  • Achieving SOC 2 Compliance With CyberStrong - APAC Recorded: May 26 2021 40 mins
    Steve Torino, Principal Solutions Architect | Nick Norton, Chief Visionary, & Client Champion, Geels Norton
    In this talk, we dive into the process of "eating our own dogfood" and how the CyberSaint team used the CyberStrong Platform to become SOC 2 certified.

    We sit down with SOC audit veterans - CyberSaint Principal Solutions Architect Steve Torino and Nick Norton, Chief Visionary and Client Champion at Geels Norton - to hear about their experiences with SOC audits and the differences they saw when using the CyberStrong platform versus other methods.
  • How Cyber/IT Risk Quantification is Fundamentally Shifting in the Next 12 Months Recorded: May 25 2021 34 mins
    Padraic O'Reilly, Chief Product Officer and Co-Founder
    For years cyber and IT risk managers have been tasked with quantifying risk without the standard benchmarking data that managers of other forms of risk are used to. However, over the course of 2020, we saw something drastic occur; coupled with the previous years' worth of data, the massive increase in cyber events saw a rise in benchmarketing data for cyber and IT risk managers.

    Join Padraic O'Reilly, CyberSaint Chief Product Officer, as we dive into what this means for the future of risk quantification and how this will impact risk programs of the future.
  • Cyber Risk Radar: The DC Police and the Future of Ransomware Recorded: May 21 2021 31 mins
    Alison Furneaux, VP Marketing | Steve Torino, Principal Solutions Architect | Michael Hamilton, Founder & CISO, CI Security
    The ransomware gang Babuk supposedly left the ransomware game briefly after attacking the Washington, DC police department and shifting from encryption to extortion. How is ransomware changing after a precipitous rise in 2020 and what can municipalities and other organizations do to protect themselves?
  • Top Business Stakeholder Relationships CISOs Need to Cultivate in 2021 Recorded: May 20 2021 23 mins
    Ethan Bresnahan, Marketing Manager
    As CISOs have been elevated within the C-Suite in the wake of digital transformation initiatives, so too have their responsibilities to partner with other business stakeholders and business unit leaders. For many security leaders, though, it can be a tough place to start.

    In this talk, we will dive into...
    - What makes an "effective" CISO
    - What are the key relationships that CISOs at varying levels of efficacy cultivate
    - How to know where you sit as a security leader and what relationships you need to build to move to the next level
Cybersecurity as a Business Function
Webinars, panels, and commentary for cutting-edge CISOs, cybersecurity teams, IT compliance professionals, and risk management experts.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Live: Automating Cyber Risk & Compliance Management with CyberStrong
  • Live at: Nov 5 2020 8:00 pm
  • Presented by: Steve Torino, Principal Solutions Architect
  • From:
Your email has been sent.
or close