Achieving Prioritised Cyber Risk Management with Extension and Instrumentation of Your Control Ecosystem

30th October 2019

Why do breaches exist? Because no one understands the estate under management or has cohesion on risk, responsibility and priority. But imagine if you could access critical information about the security health and risk level of your estate by simply asking your ecosystem of controls what you needed to know. You’d have the first stepping stone to achieving prioritised cyber risk management.

Secrutiny is hosting an intimate breakfast briefing for cyber security leaders in London on Thursday, 28th November. Join us to discover how, with a bit of extension and instrumentation, the ecosystem of controls that you already have can form the basis of an evidential, prioritised cyber risk management programme.

Date: Thursday 28th November

Time: 8:00 – 10:30

Venue: The Gherkin, 30 St Mary Axe, London EC3A 8BF


Speakers and Discussion Topics

Understanding Cyber Security Prioritisation Based on Business Risk Definition

Join Simon Crumplin, Founder of Secrutiny Ltd, as he details how embarrassment matrixes and breakthrough cyber threat prioritisation modelling are helping organisations focus risk remediation activity with business context.

Attend Simons Session



Leveraging Your Endpoint Security Solutions to Better Understand and Mitigate Risk

Graeme Jenkins, RSM at SentinelOne, discusses how Endpoint Protection has developed over the years to deliver the right security intelligence, and the must-have’s for endpoint solutions today.

Attend Graemes Session



Hear From a Peer – A Customer Case Study

The Head of Information Security and Compliance at leading construction company Morgan Sindall Group shares his experiences of working with Secrutiny and SentinelOne to develop a focused risk remediation programme and combat targeted threats.


Attend This Session



Check Out Our Other Recent Posts >

Resurgene in Emotet Malware
Resurgene in Emotet Malware

SAP has issued patches to fix a critical RECON vulnerability that can lead to total compromise of vulnerable SAP installations. It has been assigned the highest risk score of 10 on the CVSS, the most severe rating possible. It can be launched via HTTP over an internet-facing interface.