Hackers and Auditors: A Common Threat

Tim Erlin, Director, Product Management, nCircle
Compliance and information security have had a tumultuous relationship. Sometimes they get along; sometimes they don't. Organizations often combine them under the CISO, but provide dotted line reporting elsewhere for compliance. Compliance might partner with internal audit or have its own C-level position. All of this variation isn't really necessary. Compliance and Risk Management can be successfully combined under the practice of Security Performance Management.

During this webinar we will discuss how:
•Compliance behaves like more traditional information security threat.
•Compliance can be managed similarly to other information security programs.
•Security Performance Management provides a framework for comprehensive compliance and risk management across the enterprise.
May 22 2012
48 mins
Hackers and Auditors: A Common Threat
Join us for this summit:
  • Channel
  • Channel profile
Up Down
  • The Risk Management Trap: How Information Security Fails, But You Can Succeed Recorded: Apr 18 2013 37 mins
    Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.

    In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation for developing a business focused information security organization, built around real objectives and metrics.
  • Boyd’s OODA Loop and Continuous Monitoring Recorded: Mar 14 2013 42 mins
    Over the last year the threat environment has changed dramatically to include three distinct categories of attackers, and all three types of attackers are targeting organizations of every size and their data. This presentation will discuss the differences in motivation and intent for the three different types of attackers and discuss how security teams can use OODA loop principals to create and refine practical cyber security defenses for all three threat categories.
  • Vulnerability Management: You're Doing it Wrong! Recorded: Jul 19 2012 46 mins
    Vulnerability management needs a new approach. The traditional concept of scan and remediate simply doesn't work. Why do we persist in pursuing failed strategies? Stop spending time in an endless loop of scanning and fixing, instead figure out what you want to accomplish, set up your goals and then pursue them relentlessly.

    This is Security Performance Management.

    In this webinar you will learn:

    · How the current approaches to Vulnerability Management fail
    · The top 3 changes your organization needs to move from fail to win
    · Metrics that are available now to accurately measure the performance of your security organization
  • Picking the Right Provider: Building a Cloud Security Blueprint Recorded: May 23 2012 42 mins
    No matter what part of your infrastructure is in the cloud, security is crucial. Unfortunately, many unique and innovative cloud services have ignored or been indifferent to their customer’s security requirements. How can you select a cloud vendor that provides you with the services you need without compromising security? In this interactive webinar, Dave Meltzer, nCircle’s VP of Engineering and cloud security pioneer, will discuss:
    •Why security is a challenge for cloud vendors
    •Tools to assess the six basic security building blocks every cloud vendor should have in place
    •Practical recommendations for working securely with cloud vendors

    You’ll leave the webinar with an online questionnaire that will help you build a blueprint of prospective vendors’ security practices, and practical recommendations on how to accurately assess cloud vendor security risk.
  • Hackers and Auditors: A Common Threat Recorded: May 22 2012 48 mins
    Compliance and information security have had a tumultuous relationship. Sometimes they get along; sometimes they don't. Organizations often combine them under the CISO, but provide dotted line reporting elsewhere for compliance. Compliance might partner with internal audit or have its own C-level position. All of this variation isn't really necessary. Compliance and Risk Management can be successfully combined under the practice of Security Performance Management.

    During this webinar we will discuss how:
    •Compliance behaves like more traditional information security threat.
    •Compliance can be managed similarly to other information security programs.
    •Security Performance Management provides a framework for comprehensive compliance and risk management across the enterprise.
Live and on demand webinars
Attend to learn more about IT Security
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Hackers and Auditors: A Common Threat
  • Live at: May 22 2012 1:00 pm
  • Presented by: Tim Erlin, Director, Product Management, nCircle
  • From:
Your email has been sent.
or close
You must be logged in to email this