Compelling Reasons to use Vulnerability Intelligence
Dealing with the threat of cyber-attacks becomes more complex as the methods used by hackers to break into organizations and steal valuable assets become more sophisticated. Business leaders panic when hearing about the risks of advanced targeted attacks (ATA), advanced persistent threat (APT) and other acronyms.
As fairly simple techniques are all it takes to exploit vulnerabilities, and vulnerability exploitation is behind the majority of security breaches, one of the challenges organizations face in the race against cyber-attacks is acquiring trusted information about vulnerabilities to enable security teams to define strategies to mitigate risk.
In this webinar we will talk about the reasons why vulnerability intelligence is a critical part of an information security strategy. We will discuss how vulnerability research, and the intelligence derived from it, can help organizations improve their security posture.
What makes vulnerability intelligence trustworthy
The most effective uses of vulnerability intelligence
How to leverage vulnerability intelligence to reduce risk
RecordedAug 12 201434 mins
Your place is confirmed, we'll send you email reminders
Kelley Mak, Analyst, Forrester Research and Marcelo Pereira, Product Marketing Manager, Flexera Software
Vulnerability management is a necessary instrument for threat and risk reduction in enterprise environments. Yet, many organizations struggle to put a program in place that provides value to the enterprise beyond baseline compliance requirements. This is often due to challenges in three key areas of vulnerability management: discovery, prioritization, and remediation.
In this webinar, guest speaker, Forrester Research’s Kelley Mak, will provide insight on how enterprises can activate the full potential of their vulnerability management programs. Together with Flexera Software’s Marcelo Pereira, he will discuss how to combine principles of vulnerability management to other areas of operations management to efficiently improve security baseline.
John Pescatore, Director of Emerging Security Trends at SANS, Dylan Hudak and Marcelo Pereira from Flexera Software
Despite the awareness that patching plays an important role in every organizations security, we continue to see incidents in which software vulnerabilities are a root cause, or enabler of security breaches. We believe that a different perspective to patch management is the key to prioritize patching, reducing work load and improving the security baseline for organizations.
This webinar is for those in charge of scoping, supporting and executing patch management strategies. We talk about patch management in the context of security and will show how our solution, Corporate Software Inspector, can help organizations extend the scope of their Microsoft System Center implementation to prioritize patching of non-Microsoft applications.
One of the biggest challenges organizations face when trying to reduce the attack surface for cybercriminals and hackers is the lack of visibility and control over their IT environments, devices and applications. The ever growing number of software vulnerabilities makes it even more critical to leverage data from Software Asset Management (SAM) programs to help reduce security risk.
In this webinar, you will hear how to leverage existing SAM data sources such as discovery and inventory data, unlicensed and unauthorized software, along with vulnerability intelligence data, to drive mitigation of security risk through effective reduction of the attack surface.
Kasper Lindgaard – Director of Secunia Research at Flexera Software
Every year, Secunia Research at Flexera Software releases a review of the global vulnerability landscape, based on their large vulnerability database and data from the Personal Software Inspector user base.
The data in this research provides security professionals around the world with perspective on the impact and evolution of the threat landscape and what has trended throughout the year.
In this webinar, Director of Secunia Research at Flexera Software, Kasper Lindgaard will discuss the data presented in the Vulnerability Review 2016 and answer questions. The review itself is released on March 16.
-The number of vulnerabilities and zero-days detected in 2015
-How quick vendors are to respond to vulnerabilities
-Which programs have the most vulnerabilities
Amar Singh, Chair of ISACA's UK Security Advisory Group, Executive Board Member UK National MBA in Cyber Security
If you think pentesting is sexy, think again. Pentesting is mostly pointless if you have don't have the foundational backing of vulnerability information. Amar makes a bold claim and that is that Vulnerability scanning can be as important and sometimes more fun than running a pentest with some free tools. Yes, hacking maybe fun but if you really want to lower your risk exposure you need to get on top of vulnerabilities. Come and listen to Amar Singh as he shares the secrets of how to make your security assessments delivery maximum value within the shortest period of time.
Marcelo Pereira, Product Marketing Manager at Flexera Software
As we enter 2016, there is one certainty we all can have: we will continue to see costly breaches using well known vulnerabilities.
In this webinar, Marcelo Pereira will talk about the challenges that stop organizations implementing simple security best practices and suggest New Year’s resolutions related to Software Vulnerability Management that can help reduce the attack surface for cybercriminals and hackers.
Marcelo Pereira, Product Marketing Manager & Peter Jancso, Product Manager
Flexera Software just released Vulnerability Intelligence Manager 2016 - the first of the former Secunia products to be released under the Flexera Software brand.
Join us for an introduction and demo of Vulnerability Intelligence Manager 2016 and learn how the intelligence from Secunia Research and the functionality of the product can help your organization effectively reduce the attack surface for cybercriminals and hackers!
There is a critical relationship between Software Asset Management (SAM) and cyber security. Both disciplines require at their foundation the accurate and continual discovery and inventory of software assets within an organization's environment. Today IT asset management and security teams (and projects) are usually siloed within organizations, increasing the likelihood that security threats will slip through the gap. For instance, discovery and inventory of software assets are critical to both asset management and security teams - but are currently undertaken separately in most organizations.
Organizations able to leverage asset management insights combined with vulnerability data to rapidly address the most relevant cybersecurity threats will be ahead of the game. They can more effectively reduce the attack surface for cybercriminals and hackers. That means they will be also better prepared to identify and respond to breaches.
Join Flexera Software’s VP and Chief Architect, Santeri Kangas to hear about how these two disciplines can help organizations be more efficient and more secure.
Marcelo Pereira, Product Marketing Manager at Flexera Software
This webinar is focused on a strategic view of risk mitigation:
Vulnerabilities in commercial software remain one of the most common attack vectors for security incidents and data breaches, either as the entry point for hackers or the enabler of privileges escalation inside networks.
Despite awareness of the risk, and the fact that most software vulnerabilities have a fix the day they are made public, organizations continue to fail to execute mitigation actions. The consequence is that we continue to see costly breaches affecting businesses around the globe.
In this webinar, Marcelo will talk about how the use of vulnerability intelligence can be a game changer to help organizations become better at mitigating the risk of software vulnerabilities.
-Fresh data related to software vulnerabilities
-The challenge of prioritizing mitigation
-How the use of vulnerability intelligence can help support consistent risk reduction
Marcelo Pereira, Product Marketing Manager at Flexera Software
This webinar is for business leaders who wish to understand vulnerabilities on commercial software and how they can impact organizations:
Software vulnerabilities remain one of the most common attack vectors for security incidents and data breaches, either as the entry point for hackers or as the enabler of privileges escalation inside networks.
This webinar demystifies software vulnerabilities, shows how they relate to the wider ecosystem and demonstrates how this knowledge can be used to define strategies and improve security.
-What is a software vulnerability
-How a software vulnerability becomes a threat
-A glimpse of how threats multiply
-How closing vulnerabilities impacts risk reduction
Amar Singh, Chair of ISACA's UK Security Advisory Group, Exec. Board Member & Consultant to UK's National MBA in Cyber Sec.
Wishful thinking or a cursory security assessment may have worked in the past but dealing with persistent and advanced threats requires an equally sophisticated and mature approach.
While APT’s are on the rise and the use of zero-day vulnerabilities can be one of the weapons for such attacks, reality is that the large majority of incidents – advanced or not – occur using known vulnerabilities. Resolving these is, therefore, paramount to reducing the attack surface for cyber criminals.
Join Amar as he shares his tips on adopting a mature and continuing vulnerability management process that can help organizations reduce risk and be better prepared to respond to APT’s.
Kelley Mak, Researcher, Forrester Research & Santeri Kangas, CTO, Secunia
Cybersecurity incident disclosures and vulnerability warnings continue to be released at an alarming and fatiguing rate, and there aren’t any signs of breach activity slowing down. Vulnerability management is more important than ever, yet staying on top of vulnerabilities poses a major challenge for security and risk (S&R) professionals.
In this webinar, guest speaker, Forrester Research’s Kelley Mak, will provide insight on how S&R pros can repair their strained or broken vulnerability management processes and move past low impact checkbox scanning to proactive, risk-based assessments.
Following Kelley Mak’s presentation on the changes in vulnerability management, Secunia’s CTO Santeri Kangas will present Secunia’s take on the challenges of vulnerability management and how the Secunia VIM, our Vulnerability Intelligence Manager, helps organizations address those challenges.
The era of digital business is bringing a lot of opportunities for organizations. At the same time, it is bringing new challenges for those in charge of securing companies’ assets: customer data, intellectual property, and infrastructure.
The digital business environment requires a new approach to security. An approach that focuses on supporting the business to achieve its desired outcomes while ensuring that what really matters is protected from the reach of hackers and criminals.
In this webinar we will look into two distinct areas of IT: Enterprise Application and Mobility and the vulnerability landscape around those to discuss some of the challenges security professionals are facing today.
Globally, we are seeing an increase in Advanced Persistent Threats (APT) and targeted attacks. And while the strategy applied to choosing which organizations and assets to target is increasingly sophisticated, the methods are the same as always: exploiting well-known vulnerabilities that could have been mitigated with simple and fundamental controls.
In this webinar, Secunia’s new CTO Santeri Kangas will use real-life examples to demonstrate how hackers actually exploit vulnerabilities, and illustrate the risk organizations are effectively accepting, when they neglect the fundamentals of IT security. Kangas also discusses how organizations can strengthen their resilience to attacks that exploit publicly known vulnerabilities, and explain why business leaders are central players in saving the company bacon: they need to get behind the efforts to get security fundamentals right.
You have System Center 2012 Configuration Manager implemented in your environment, and you are realizing great results with it. However, can you take it a bit further to gain even more benefits? You sure can, and Cireson can help. In this session, Wally will introduce you to the Cireson Remote Manage app, which can assist your help desk in supporting their clients, as well as Cireson Asset Management, which can provide full asset management capabilities that leverage your Configuration Manager investment.
Attend this session and learn:
· How the Cireson Remote Manage app can assist your help desk analyst in supporting their customers
· How to enhance asset management capabilities of Configuration Manager with Cireson’s Asset Management capabilities to provide financial and business data tied into your software and hardware assets
· How to manage 3rd party software with ConfigMgr and how Secunia can enhance that process
Andrei Vilcan, Head of Information Security, Banca Transilvania
In this webinar, Andrei Vilcan will present his approach to Information Security and how he and his team work to mitigate the risk of Advanced Persistent Threat attacks at Banca Transilvania.
He will introduce the aspects of the multi-layered approach to the Information Security strategy he is in charge of implementing, the challenges he faces and his achievements so far.
As a Secunia CSI user, he will share how the solution helps him in one of the key areas of his strategy: security patch management.
About Andrei: Andrei is Head of Information Security at Banca Transilvania. He has 23 years of experience in IT Management, the past 6 of which is in IT Security. He works to protect his organization’s assets, including customer data, to ensure that the business can operate without disruptions.
Marcelo Pereira, Business Development and Analyst Relations, Secunia
Managing risk must start with reducing the cracks and holes through which unwelcome visitors can gain access to any valuables you want to protect.
Software vulnerabilities are often the entry points used by cybercriminals to get into organizations and escalate attacks. For that reason, having a comprehensive overview and accurate information on software vulnerabilities is one of the critical factors to assess risk and prioritize the actions that will have a strong and consistent impact on reducing the attack surface.
The immediate result of managing software vulnerabilities is the proactive reduction of risk, but there is another, often overlooked, benefit for organizations. Less cracks and holes means less noise for those who monitor environments for incidents and are responsible for responding to them. The outcome is improved accuracy, faster responses and lower cost.
In this webinar we explain the intelligence that goes into managing software vulnerabilities, how it differs from basic information about vulnerabilities and how organizations can benefit from intelligence to become more secure.
Fundamentals to reduce risk through vulnerability and asset management
Managing and securing software assets through the entire asset lifecycle is key to the overall security of organizations across the globe. In this channel, Flexera Software shares knowledge, research and experience about software licensing, compliance and vulnerability management to help you overcome the challenges you face in managing and securing your assets.
Speakers include in-house technical and process specialists, customers and industry thought leaders who will talk about a variety of topics and present timely information and data on software vulnerabilities and software asset management.
Les SOC D’aujourd’hui se détournent de leur métier de base en devenant des centres de gestion d’alertes. Nous vous présenterons comment l’apport de la cyberveille peut permettre aux équipes de passer d’un mode réactif qui gère des alertes à un modèle proactif axé sur la chasse aux indicateurs et aux groupes d’assaillants présents sur vos environnements IT.
Smart Storage for the cloud IT is effortless, efficient and evergreen. In this webinar, learn how operational simplicity, data efficiency, and predictable performance through flash will enable your business to be more competitive in the market at the same cost as traditional disk infrastructure.
We will cover:
- What is possible with flash?
- What flash solutions are available today?
- How do the costs compare?
- Pure Storage architecture overview
- Demonstration of storage provisioning tasks
Hadoop is a wonderful framework that can drive insight into a range of problems, but administrators can be blind to performance, utilization and cost issues of cluster deployments. There’s risk in sizing initial deployments properly, as well as determining optimal capacity over time. Without sufficient visibility, job performance can suffer and costs can escalate. Keeping a critical resource running effectively and being able to plan for the future requires intelligent decision making capabilities that many Hadoop deployments lack. This webinar will look into common problems that affect clusters and ways to detect issues early and head off long term problems. We’ll dig into capacity management and ways to deal with ever increasing demands for Hadoop resources.
• Understand initial deployment challenges
• Handling cluster growth
• Working to meet increasing pressure on storage and job density
• Planning for capacity growth and extension to cloud
In this session, you will gain understanding on how data is growing faster and is shared every day across the business world. It looks that company’s today won’t survive without their Data, and it’s not only a matter of lose everything, could be a matter of unavailability and you are out of Business. This session will cover how to protect your data and secure it for sharing
Bimodal IT is putting even the most talented development teams to the test. No matter if you support or oppose the idea of two distinct speeds of IT, you’ll want to hear Jason Bloomberg from Intellyx and Deloitte’s Rui Vaz debate and discuss the realities of taking a bimodal approach.
You’re invited to learn about an exciting opportunity to be a part of SAP’s growing partner ecosystem. With the SAP PartnerEdge program for Application Development, SAP has made it is easier than ever for organizations like yours to build and monetize cloud applications leveraging SAP HANA Cloud Platform (HCP).
With SAP HANA Cloud Platform – an open, in-memory, standards-based platform as a service, and the primary technology for SAP application extensibility – you can:
• Rapidly build and deploy applications in the cloud for faster time to value
• Extend SAP and non-SAP software business processes to the cloud for greater agility
• Develop mobile-ready, rich applications to drive productivity and customer satisfaction
• Benefit from SAP enterprise-class support, high platform availability, and access to the SAP ecosystem
• Leverage SAP Digital Channels and flexible license options to market your packaged solution to approximately 300,000 SAP customers
Join us on September 22 and discover the benefits of the SAP PartnerEdge program for Application Development and SAP HANA Cloud Platform, and let us help you grow your business for tomorrow.
View this on-demand webinar make sense of why, although Enterprise IT is increasingly relying on OpenStack as a platform for the deployment of cloud services, OpenStack is still complex and it can be difficult to assure optimal performance of key workloads. During this webinar we discussed the deployment of enterprise workloads on OpenStack, with particular emphasis on the use of dedicated block storage systems.
Topics addressed include:
-Critical business challenges
-Simple ways to increase OpenStack simplicity, efficiency, and performance while minimizing risk
Joseph Ruffles, Global Product Marketing Manager for Cloud and Virtualization, SevOne
Joel McKelvey, Infrastructure Solutions, Pure Storage
View this on-demand webinar to see for yourself how the combination of flash storage with improved copy data management has the potential to greatly improve developer productivity and accelerate your DevOps processes. Industry leaders Pure Storage and Commvault teamed up to offer an optimized solution designed to deliver speed and agility to your DevOps methodologies. View this webinar to learn:
-How thorough and broad application integration makes the DevOps environment more nimble and flexible
-How application-aware, space-efficient snapshots translate to developer productivity
-How efficiency gains are possible by combining software and hardware based data reduction
Lance Shaw, Director of Product Marketing, Commvault
Abdul Rasheed, Solutions Marketing Manager, Pure Storage
View this on-demand webinar to learn why managing data is a crucial factor in the success of healthcare organizations. For this reason, it is imperative to have a storage infrastructure that is simple to manage, easily sustains growth, and aligns to application demands. Traditionally, upgrading storage infrastructures meant huge risks for the business and sacrifices for IT Departments - often only providing fractional performance improvement once completed. Hear from Pure Storage and Mount Sinai Health to see for yourself the impact Pure Storage has had on the hospital's business and infrastructure.
During the conversation you will learn:
-What made Mount Sinai make the transition from from legacy storage to an all flash platform from Pure Storage
-The business impact flash has had on their Oracle ERP/SOA environment
-Feedback from IT around the deployment and management of Pure Storage
-Best practices for introducing new technologies into a large infrastructure
Rich Araujo, Associate Director, Storage and Back up, Mount Sinai Health System
Matthew Rund, Regional Manager, Healthcare, Pure Storage
There is no denying that AWS is the dominant public cloud provider today. Does creating differentiation give other IaaS vendors, hosters, and private cloud and colocation providers a chance to compete tomorrow? This analyst-only panel will connect the dots between customer requirements and best execution venues, as well as highlight where service providers should compete or cooperate with the hyperscale providers, by exploring:
- Is there room for more hyperscale providers?
- How important are open source solutions going forward?
- Differentiation through vertical, workload and technology specializations.
- Cloud migration and portfolio management services