Patching and Compliance: A CISO's perspective to reducing risk
Join us on Tuesday, July 15th for a Webinar with Larry Whiteside, Chief Information Security Officer for LCRA, as he discusses Patching and Compliance: A CISO's perspective to reducing risk.
Over the past few years security has gotten caught up in the latest hype or trends related to threats. This has caused many security teams to lose focus of some basic things that can be done to mitigate new and old threats in their environment. In this Webinar we will discuss tride and true techniques to mitigate risk and help security organizations take care of some low hanging fruit.
RecordedJul 15 201448 mins
Your place is confirmed, we'll send you email reminders
Organizations struggle to prioritize and implement the vast number of patches being introduced by software vendors. Testing and implementing takes time and most organizations simply apply a blanket set of patches for well-known software. However, attacks like ransomware are multi-vector and target a wide range of vulnerable software. While many of these vulnerabilities have patches, most organizations are not applying the most critical patches across their infrastructure, leaving them open to these very effective attacks.
In this webinar, IDC Research Director Rob Ayoub and Flexera Software will discuss the need for a more targeted approach to patching – an approach that considers the exploitability of vulnerabilities and other factors beyond a CVE score.
Kasper Lindgaard, Director of Secunia Research at Flexera Software
Year after year some of the trends for vulnerabilities remain unchanged while others arise or shift. In this webinar, Kasper Lindgaard, Director of Secunia Research at Flexera Software will discuss some of the most relevant topics in the year so far, as observed by his team of vulnerability research experts. Take-aways from this session:
- Vulnerabilities on niche software are also making headlines
- The ever growing risk of embedded applications
- Why you should not neglect less common applications
Kelley Mak, Analyst, Forrester Research and Marcelo Pereira, Product Marketing Manager, Flexera Software
Vulnerability management is a necessary instrument for threat and risk reduction in enterprise environments. Yet, many organizations struggle to put a program in place that provides value to the enterprise beyond baseline compliance requirements. This is often due to challenges in three key areas of vulnerability management: discovery, prioritization, and remediation.
In this webinar, guest speaker, Forrester Research’s Kelley Mak, will provide insight on how enterprises can activate the full potential of their vulnerability management programs. Together with Flexera Software’s Marcelo Pereira, he will discuss how to combine principles of vulnerability management to other areas of operations management to efficiently improve security baseline.
John Pescatore, Director of Emerging Security Trends at SANS, Dylan Hudak and Marcelo Pereira from Flexera Software
Despite the awareness that patching plays an important role in every organizations security, we continue to see incidents in which software vulnerabilities are a root cause, or enabler of security breaches. We believe that a different perspective to patch management is the key to prioritize patching, reducing work load and improving the security baseline for organizations.
This webinar is for those in charge of scoping, supporting and executing patch management strategies. We talk about patch management in the context of security and will show how our solution, Corporate Software Inspector, can help organizations extend the scope of their Microsoft System Center implementation to prioritize patching of non-Microsoft applications.
One of the biggest challenges organizations face when trying to reduce the attack surface for cybercriminals and hackers is the lack of visibility and control over their IT environments, devices and applications. The ever growing number of software vulnerabilities makes it even more critical to leverage data from Software Asset Management (SAM) programs to help reduce security risk.
In this webinar, you will hear how to leverage existing SAM data sources such as discovery and inventory data, unlicensed and unauthorized software, along with vulnerability intelligence data, to drive mitigation of security risk through effective reduction of the attack surface.
Kasper Lindgaard – Director of Secunia Research at Flexera Software
Every year, Secunia Research at Flexera Software releases a review of the global vulnerability landscape, based on their large vulnerability database and data from the Personal Software Inspector user base.
The data in this research provides security professionals around the world with perspective on the impact and evolution of the threat landscape and what has trended throughout the year.
In this webinar, Director of Secunia Research at Flexera Software, Kasper Lindgaard will discuss the data presented in the Vulnerability Review 2016 and answer questions. The review itself is released on March 16.
-The number of vulnerabilities and zero-days detected in 2015
-How quick vendors are to respond to vulnerabilities
-Which programs have the most vulnerabilities
Amar Singh, Chair of ISACA's UK Security Advisory Group, Executive Board Member UK National MBA in Cyber Security
If you think pentesting is sexy, think again. Pentesting is mostly pointless if you have don't have the foundational backing of vulnerability information. Amar makes a bold claim and that is that Vulnerability scanning can be as important and sometimes more fun than running a pentest with some free tools. Yes, hacking maybe fun but if you really want to lower your risk exposure you need to get on top of vulnerabilities. Come and listen to Amar Singh as he shares the secrets of how to make your security assessments delivery maximum value within the shortest period of time.
Marcelo Pereira, Product Marketing Manager at Flexera Software
As we enter 2016, there is one certainty we all can have: we will continue to see costly breaches using well known vulnerabilities.
In this webinar, Marcelo Pereira will talk about the challenges that stop organizations implementing simple security best practices and suggest New Year’s resolutions related to Software Vulnerability Management that can help reduce the attack surface for cybercriminals and hackers.
Marcelo Pereira, Product Marketing Manager & Peter Jancso, Product Manager
Flexera Software just released Vulnerability Intelligence Manager 2016 - the first of the former Secunia products to be released under the Flexera Software brand.
Join us for an introduction and demo of Vulnerability Intelligence Manager 2016 and learn how the intelligence from Secunia Research and the functionality of the product can help your organization effectively reduce the attack surface for cybercriminals and hackers!
There is a critical relationship between Software Asset Management (SAM) and cyber security. Both disciplines require at their foundation the accurate and continual discovery and inventory of software assets within an organization's environment. Today IT asset management and security teams (and projects) are usually siloed within organizations, increasing the likelihood that security threats will slip through the gap. For instance, discovery and inventory of software assets are critical to both asset management and security teams - but are currently undertaken separately in most organizations.
Organizations able to leverage asset management insights combined with vulnerability data to rapidly address the most relevant cybersecurity threats will be ahead of the game. They can more effectively reduce the attack surface for cybercriminals and hackers. That means they will be also better prepared to identify and respond to breaches.
Join Flexera Software’s VP and Chief Architect, Santeri Kangas to hear about how these two disciplines can help organizations be more efficient and more secure.
Marcelo Pereira, Product Marketing Manager at Flexera Software
This webinar is focused on a strategic view of risk mitigation:
Vulnerabilities in commercial software remain one of the most common attack vectors for security incidents and data breaches, either as the entry point for hackers or the enabler of privileges escalation inside networks.
Despite awareness of the risk, and the fact that most software vulnerabilities have a fix the day they are made public, organizations continue to fail to execute mitigation actions. The consequence is that we continue to see costly breaches affecting businesses around the globe.
In this webinar, Marcelo will talk about how the use of vulnerability intelligence can be a game changer to help organizations become better at mitigating the risk of software vulnerabilities.
-Fresh data related to software vulnerabilities
-The challenge of prioritizing mitigation
-How the use of vulnerability intelligence can help support consistent risk reduction
Marcelo Pereira, Product Marketing Manager at Flexera Software
This webinar is for business leaders who wish to understand vulnerabilities on commercial software and how they can impact organizations:
Software vulnerabilities remain one of the most common attack vectors for security incidents and data breaches, either as the entry point for hackers or as the enabler of privileges escalation inside networks.
This webinar demystifies software vulnerabilities, shows how they relate to the wider ecosystem and demonstrates how this knowledge can be used to define strategies and improve security.
-What is a software vulnerability
-How a software vulnerability becomes a threat
-A glimpse of how threats multiply
-How closing vulnerabilities impacts risk reduction
Amar Singh, Chair of ISACA's UK Security Advisory Group, Exec. Board Member & Consultant to UK's National MBA in Cyber Sec.
Wishful thinking or a cursory security assessment may have worked in the past but dealing with persistent and advanced threats requires an equally sophisticated and mature approach.
While APT’s are on the rise and the use of zero-day vulnerabilities can be one of the weapons for such attacks, reality is that the large majority of incidents – advanced or not – occur using known vulnerabilities. Resolving these is, therefore, paramount to reducing the attack surface for cyber criminals.
Join Amar as he shares his tips on adopting a mature and continuing vulnerability management process that can help organizations reduce risk and be better prepared to respond to APT’s.
Kelley Mak, Researcher, Forrester Research & Santeri Kangas, CTO, Secunia
Cybersecurity incident disclosures and vulnerability warnings continue to be released at an alarming and fatiguing rate, and there aren’t any signs of breach activity slowing down. Vulnerability management is more important than ever, yet staying on top of vulnerabilities poses a major challenge for security and risk (S&R) professionals.
In this webinar, guest speaker, Forrester Research’s Kelley Mak, will provide insight on how S&R pros can repair their strained or broken vulnerability management processes and move past low impact checkbox scanning to proactive, risk-based assessments.
Following Kelley Mak’s presentation on the changes in vulnerability management, Secunia’s CTO Santeri Kangas will present Secunia’s take on the challenges of vulnerability management and how the Secunia VIM, our Vulnerability Intelligence Manager, helps organizations address those challenges.
The era of digital business is bringing a lot of opportunities for organizations. At the same time, it is bringing new challenges for those in charge of securing companies’ assets: customer data, intellectual property, and infrastructure.
The digital business environment requires a new approach to security. An approach that focuses on supporting the business to achieve its desired outcomes while ensuring that what really matters is protected from the reach of hackers and criminals.
In this webinar we will look into two distinct areas of IT: Enterprise Application and Mobility and the vulnerability landscape around those to discuss some of the challenges security professionals are facing today.
Globally, we are seeing an increase in Advanced Persistent Threats (APT) and targeted attacks. And while the strategy applied to choosing which organizations and assets to target is increasingly sophisticated, the methods are the same as always: exploiting well-known vulnerabilities that could have been mitigated with simple and fundamental controls.
In this webinar, Secunia’s new CTO Santeri Kangas will use real-life examples to demonstrate how hackers actually exploit vulnerabilities, and illustrate the risk organizations are effectively accepting, when they neglect the fundamentals of IT security. Kangas also discusses how organizations can strengthen their resilience to attacks that exploit publicly known vulnerabilities, and explain why business leaders are central players in saving the company bacon: they need to get behind the efforts to get security fundamentals right.
You have System Center 2012 Configuration Manager implemented in your environment, and you are realizing great results with it. However, can you take it a bit further to gain even more benefits? You sure can, and Cireson can help. In this session, Wally will introduce you to the Cireson Remote Manage app, which can assist your help desk in supporting their clients, as well as Cireson Asset Management, which can provide full asset management capabilities that leverage your Configuration Manager investment.
Attend this session and learn:
· How the Cireson Remote Manage app can assist your help desk analyst in supporting their customers
· How to enhance asset management capabilities of Configuration Manager with Cireson’s Asset Management capabilities to provide financial and business data tied into your software and hardware assets
· How to manage 3rd party software with ConfigMgr and how Secunia can enhance that process
Andrei Vilcan, Head of Information Security, Banca Transilvania
In this webinar, Andrei Vilcan will present his approach to Information Security and how he and his team work to mitigate the risk of Advanced Persistent Threat attacks at Banca Transilvania.
He will introduce the aspects of the multi-layered approach to the Information Security strategy he is in charge of implementing, the challenges he faces and his achievements so far.
As a Secunia CSI user, he will share how the solution helps him in one of the key areas of his strategy: security patch management.
About Andrei: Andrei is Head of Information Security at Banca Transilvania. He has 23 years of experience in IT Management, the past 6 of which is in IT Security. He works to protect his organization’s assets, including customer data, to ensure that the business can operate without disruptions.
Fundamentals to reduce risk through vulnerability and asset management
Managing and securing software assets through the entire asset lifecycle is key to the overall security of organizations across the globe. In this channel, Flexera Software shares knowledge, research and experience about software licensing, compliance and vulnerability management to help you overcome the challenges you face in managing and securing your assets.
Speakers include in-house technical and process specialists, customers and industry thought leaders who will talk about a variety of topics and present timely information and data on software vulnerabilities and software asset management.