Achieving Prioritised Cyber Risk Management with Extension and Instrumentation of Your Control Ecosystem
30th October 2019
Why do breaches exist? Because no one understands the estate under management or has cohesion on risk, responsibility and priority. But imagine if you could access critical information about the security health and risk level of your estate by simply asking your ecosystem of controls what you needed to know. You’d have the first stepping stone to achieving prioritised cyber risk management.
Secrutiny is hosting an intimate breakfast briefing for cyber security leaders in London on Thursday, 28th November. Join us to discover how, with a bit of extension and instrumentation, the ecosystem of controls that you already have can form the basis of an evidential, prioritised cyber risk management programme.
Time: 8:00 – 10:30
Venue: The Gherkin, 30 St Mary Axe, London EC3A 8BF
Speakers and Discussion Topics
Understanding Cyber Security Prioritisation Based on Business Risk Definition
Join Simon Crumplin, Founder of Secrutiny Ltd, as he details how embarrassment matrixes and breakthrough cyber threat prioritisation modelling are helping organisations focus risk remediation activity with business context.
Leveraging Your Endpoint Security Solutions to Better Understand and Mitigate Risk
Graeme Jenkins, RSM at SentinelOne, discusses how Endpoint Protection has developed over the years to deliver the right security intelligence, and the must-have’s for endpoint solutions today.
Hear From a Peer – A Customer Case Study
The Head of Information Security and Compliance at leading construction company Morgan Sindall Group shares his experiences of working with Secrutiny and SentinelOne to develop a focused risk remediation programme and combat targeted threats.
Check Out Our Other Recent Posts >
Last month we had the opportunity to be a part of Securing the Law Firm 2019 with an Education Seminar centred around best-practice for constructing SOC-as-a-Service (SOCaaS), so you know you can get value; here’s the low-down.
Gartner Reveals Breach and Attack Simulation Technologies as One of the Top Cyber Security Solutions
Breach and attack simulation technologies have been highlighted as one of the top solutions for CISOs to consider in Gartner’s recent report, ‘How to Respond to the 2019 Threat Landscape’.
A recent survey of security professionals carried out by Secrutiny revealed that more than 80% of respondents are concerned about data loss post threat.