Achieving Prioritised Cyber Risk Management with Extension and Instrumentation of Your Control Ecosystem
30th October 2019
Why do breaches exist? Because no one understands the estate under management or has cohesion on risk, responsibility and priority. But imagine if you could access critical information about the security health and risk level of your estate by simply asking your ecosystem of controls what you needed to know. You’d have the first stepping stone to achieving prioritised cyber risk management.
Secrutiny is hosting an intimate breakfast briefing for cyber security leaders in London on Thursday, 28th November. Join us to discover how, with a bit of extension and instrumentation, the ecosystem of controls that you already have can form the basis of an evidential, prioritised cyber risk management programme.
Time: 8:00 – 10:30
Venue: The Gherkin, 30 St Mary Axe, London EC3A 8BF
Speakers and Discussion Topics
Understanding Cyber Security Prioritisation Based on Business Risk Definition
Join Simon Crumplin, Founder of Secrutiny Ltd, as he details how embarrassment matrixes and breakthrough cyber threat prioritisation modelling are helping organisations focus risk remediation activity with business context.
Leveraging Your Endpoint Security Solutions to Better Understand and Mitigate Risk
Graeme Jenkins, RSM at SentinelOne, discusses how Endpoint Protection has developed over the years to deliver the right security intelligence, and the must-have’s for endpoint solutions today.
Hear From a Peer – A Customer Case Study
The Head of Information Security and Compliance at leading construction company Morgan Sindall Group shares his experiences of working with Secrutiny and SentinelOne to develop a focused risk remediation programme and combat targeted threats.
Check Out Our Other Recent Posts >
Join Secrutiny for an exclusive opportunity to see how the precision of rugby has been applied to the cyber security space. First episode out now!
Obsolete software and exposed VPNs come with a host of security vulnerabilities. Understand the dangers and how to secure them in the age of remote work.
74% of breaches involve a privileged account, yet only 3/10 organisations have implemented a PAM solution. Are your privileged accounts at risk?