Achieving Prioritised Cyber Risk Management with Extension and Instrumentation of Your Control Ecosystem
30th October 2019
Why do breaches exist? Because no one understands the estate under management or has cohesion on risk, responsibility and priority. But imagine if you could access critical information about the security health and risk level of your estate by simply asking your ecosystem of controls what you needed to know. You’d have the first stepping stone to achieving prioritised cyber risk management.
Secrutiny is hosting an intimate breakfast briefing for cyber security leaders in London on Thursday, 28th November. Join us to discover how, with a bit of extension and instrumentation, the ecosystem of controls that you already have can form the basis of an evidential, prioritised cyber risk management programme.
Time: 8:00 – 10:30
Venue: The Gherkin, 30 St Mary Axe, London EC3A 8BF
Speakers and Discussion Topics
Understanding Cyber Security Prioritisation Based on Business Risk Definition
Join Simon Crumplin, Founder of Secrutiny Ltd, as he details how embarrassment matrixes and breakthrough cyber threat prioritisation modelling are helping organisations focus risk remediation activity with business context.
Leveraging Your Endpoint Security Solutions to Better Understand and Mitigate Risk
Graeme Jenkins, RSM at SentinelOne, discusses how Endpoint Protection has developed over the years to deliver the right security intelligence, and the must-have’s for endpoint solutions today.
Hear From a Peer – A Customer Case Study
The Head of Information Security and Compliance at leading construction company Morgan Sindall Group shares his experiences of working with Secrutiny and SentinelOne to develop a focused risk remediation programme and combat targeted threats.
Check Out Our Other Recent Posts >
Is Broadcom about to shake up the Symantec enterprise following its acquisition or does this kick start the end of the line for Symantec.
Managing security risks and responding to incidents are significant operational tasks, and the speed at which you react is crucial. Take a look at how to regain control in our latest blog post which highlights the importance of Context, Visibility and Control.
Last month we had the opportunity to be a part of Securing the Law Firm 2019 with an Education Seminar centred around best-practice for constructing SOC-as-a-Service (SOCaaS), so you know you can get value; here’s the low-down.