If your security test data indicates many vulnerabilities, yet your compliance and risk programs show no sign of these issues, you could have a critical data problem.
Security test data (pen testing, scanning) sitting in a silo means you do not know which threats and vulnerabilities are the most significant risks to your organization. Risk and Compliance programs will likely be able to guide these efforts, but why are the two not connected?
During this session, we will explore the root causes behind this data integration issue (within a compliance and risk context). We will then outline and discuss practical strategies for overcoming these problems.
Benefits of Attending:
1. Understand why organizations experience security incidents despite extensive testing and heavy investment in compliance and risk management programs.
2. Why is it essential to be able to cross-reference vulnerability data against your compliance and risk programs?
3. Understand the advantages of having a single source of truth when managing compliance and risk.
4. Evaluate a range of practical strategies for integrating vulnerability data into your organization’s risk and compliance management view.
Our speaker- Alex Brown, VP of Product
Alex Brown oversees the definition and delivery of all SureCloud’s product solutions across both GRC and Cybersecurity. Alex previously held senior product management positions at US-based technology companies; Veritas Technologies and Symantec, where he helped bring numerous information management, software and SaaS, solutions to market across EMEA, the Americas and Asia Pacific.
Timestamps:
0:00 Introduction
0:43 How organizations are attempting to meet their risk management objectives
3:09 Why do disconnects occur between vulnerability data and compliance and risk systems?
5:26 What are the consequences of vulnerability data and compliance and risk system data disconnects?
8:46 Aligning your views of risk, compliance and vulnerabilities: The art of the possible.
9:49 What is needed to align vulnerability data with information from GRC systems?
10:50 Analysis of a real-world use case
13:22 Summary and close
Learn more at [ Ссылка ] and [ Ссылка ]
Ещё видео!