Leveraging a Risk-Based Approach to Vulnerability Management to Unify Security and Operations
Wednesday, February 20, 2019
11:00 am New York / 4:00 pm London
Hear from security industry expert from Ovum on moving from silos to collaboration across security and IT teams.
For years organizations have leveraged traditional Key Performance Indicators (KPIs) to define success in their Vulnerability Management programs. Unfortunately, this often pitts the security team, who drives the assignment of work, against the overloaded operations team, who performs the work, against one another. The transition to a risk-based approach offers many benefits including more effective communications, a shared understanding of priorities, and a unified sense of purpose. These benefits enable security and operations teams to truly work together to improve the effectiveness of your Vulnerability Management program.
What you will learn:
- What will replace KPIs and why
- How risk can be calculated beyond what your vulnerability scanners provide
- How to formalize a risk-based approach to vulnerability management with Key Risk Indicators (KRIs) as your foundation
- Why building workflows into your security and operations team processes reduces time, effort and results in building collaboration
Maxine Holt, Research Director, Ovum
close this window
Maxine leads Ovum's security proposition, developing a comprehensive research program in this area to support vendor, service provider, and enterprise clients. Having worked with enterprises across multiple industries in the world of information security, Maxine has a strong understanding of the challenges faced and how organizations can look to overcome these challenges.
Maxine rejoined Ovum in 2018, having spent over two years at the Information Security Forum (ISF) developing research in areas including Protecting the Crown Jewels and Securing Collaboration Platforms. Prior to the ISF, Maxine spent 15 years at Ovum covering topics including security, human capital management, and identity and access management. Maxine has a particular interest in how all the component parts of security combine to make up an organization's security posture.
Starting her career as a software developer in the financial services industry, Maxine gradually progressed into a systems analyst role and then moved into consulting for the financial services and internet sectors. She is a regular speaker at events and writes a monthly Computer Weekly article covering various aspects of information security.
Jason Farmer, Senior Solutions Manager, RiskSense
close this window
Jason Farmer, Senior Solutions Manager at RiskSense, is an expert in cybersecurity risk management, privacy, and compliance. He has held senior technical engineering positions at leading security vendors including Arbor Networks, the security division of NetScout, RSA Security, Promisec, NetIQ, RedSeal and McAfee, which gives him a unique perspective on how customers successfully deploy and best leverage the security technology stack to achieve their desire security posture within the confines of their own resources and expertise.
Bernd Steinwender, Head of Product Management, NTS Retail
close this window
Bernd is currently the Head of Product Management at NTS.
His career at NTS Retail started 2001 when he was working as a technical engineer. After that he became a project manager for many telco projects he then moved forward to the key account management. With this background he was appointed to become the Head of Product Management.
The educational background includes finalizing a higher technical school in electrical engineering and a graduate in Computer science at the JKU – Johannes Kepler University Linz in 2000..
Katharine Hulls, Vice President Marketing, Celebrus Technologies
close this window
As VP Marketing for Celebrus Technologies, Katharine is responsible for global marketing and communications, both direct to end-users and via a worldwide network of partners. This responsibility includes the development and execution of joint marketing activities with key partners, messaging and proposition creation, product marketing, digital marketing, content marketing and analyst relations.
Katharine has over 20 years’ marketing management experience with a strong focus on data and analytics software and services providers. Before joining Celebrus in July 2011, Katharine was Head of Marketing, EMEA for Experian Marketing Services which encompasses brands such as CheetahMail, QAS, Hitwise and Mosaic. Earlier during her tenure at Experian, Katharine was also Head of Marketing for CheetahMail across EMEA and UK/Ireland.
Prior to her three years at Experian, Katharine worked for predictive analytics software vendor SPSS, before their acquisition by IBM, where she led and reshaped the UK Marketing team and was part of the EMEA Marketing Management group. Previous to that, Katharine was responsible for marketing communications across EMEA and APAC for web security company Websense, and before that she held a variety of global and EMEA marketing management roles at industry analyst Gartner. Katharine started her marketing career at Sony.
Katharine holds a BA (Hons) from the University of London and the Chartered Institute of Marketing’s Postgraduate Diploma.
Peter Dorrington, European Head of Customer Insight, TeleTech Consulting
close this window
Peter is a specialist in information strategy, big data and customer analytics. He has formed and led a high performing analytics team in an Analytics Centre of Excellence and worked with a wide range of organisations across Europe. Peter has supported senior executives in preparing strategies and plans for the exploitation of big data and analytics as well as led governance and project offices of large scale analytics deployments in both traditional and digital environments and across multiple sectors.
San Zaw, Head of Pre-Sales, Asia at TIBCO Software Inc.
close this window
San Zaw is the Director of Solutions Consultants in Asia at TIBCO Software. Based in Singapore, San leads the regional pre-sales teams across South East Asia, Greater China, and Korea, and is responsible for the solution sales business growth in the Asia region.
He is a practitioner in Contextual Event Processing and Digital Services, and works with Asia’s leading Financial Services Institutions and Communications Service Providers on architecting game-changing solutions, and delivering differentiated customer experiences.
A seasoned veteran in the Telecommunications industry, San is a regular speaker and thought leader at financial and mobility innovation circles. His interests include helping enterprises monetize on their digital ecosystem, exposing businesses to the API economy, and advocating of live behaviour and lifestyle monetization with Fast Data (live insight-to-action).
San brings over two decades of experience in the field of InfoComm Technology and built a track record in solving complex business challenges for enterprises ranging from Telco, Banking, Transportation & Logistics, Healthcare, Gaming, to Defense and Statutory bodies. During his career at TIBCO, he has helped spearhead the development of the business in the emerging markets across Asia.
Prior to TIBCO, San has worked with Deutsche Telekom AG on tele-commerce initiatives, and with StarHub Ltd where he helped build the managed services consulting practice.
Webinar Archive Registration
To register for this webinar, please complete the form below. Take care to provide all required information (indicated in red
). Press Register
to complete your registration. If you have already registered for our site or for one of our webinars, you may login
to register without re-entering your information.
Cisco's research has proven that beyond meeting compliance requirements, good privacy is good for business and individuals.
Once again, a novel 'speculative execution side-channel' attack has been discovered by researchers.
Security researchers have found that the implementation in Remote Desktop Gateway of string segmentation lays it open to memory corruption vulnerabilities.
In Q4 of 2019, the average ransom payment increased by 104% to $84,116, finds Coveware report.
DHS-CISA has issued a security advisory about GE Carescape medical instrumentation that enumerates many vulnerabilities present in them.
Podcast: Infrastructure Hunting – Stopping Bad Actors in Their Tracks
Being able to effectively build a threat intelligence ecosystem or threat-hunting identification response requires both user and systems sophistication and capabilities. Security, orchestration, automation and response (SOAR) is a new technology designed to provide organizations a single comprehensive platform they can use to implement an intelligence driven security strategy.
In a wide-ranging interview, Cisco security boss Gee Rittenhouse talks about how machine learning, AI, blockchain and other emerging technologies ...
CloudPassage's new technology, called Container Secure, involves a five-step process to ensure seamless security in container deployments from the ...
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
Sage Wagner, senior security pre-sales engineer with RiskSense, provides a demo of the company's latest technology 'RiskSense Solution,' a ...
Janus Technologies is launching a line of products that protect against the many threats to enterprises' sensitive data. David Schultz, vice ...
This new video will inspire companies to reimagine their business for success in a world where connectivity is more than a commodity.