Achieving Prioritised Cyber Risk Management with Extension and Instrumentation of Your Control Ecosystem
30th October 2019
Why do breaches exist? Because no one understands the estate under management or has cohesion on risk, responsibility and priority. But imagine if you could access critical information about the security health and risk level of your estate by simply asking your ecosystem of controls what you needed to know. You’d have the first stepping stone to achieving prioritised cyber risk management.
Secrutiny is hosting an intimate breakfast briefing for cyber security leaders in London on Thursday, 28th November. Join us to discover how, with a bit of extension and instrumentation, the ecosystem of controls that you already have can form the basis of an evidential, prioritised cyber risk management programme.
Time: 8:00 – 10:30
Venue: The Gherkin, 30 St Mary Axe, London EC3A 8BF
Speakers and Discussion Topics
Understanding Cyber Security Prioritisation Based on Business Risk Definition
Join Simon Crumplin, Founder of Secrutiny Ltd, as he details how embarrassment matrixes and breakthrough cyber threat prioritisation modelling are helping organisations focus risk remediation activity with business context.
Leveraging Your Endpoint Security Solutions to Better Understand and Mitigate Risk
Graeme Jenkins, RSM at SentinelOne, discusses how Endpoint Protection has developed over the years to deliver the right security intelligence, and the must-have’s for endpoint solutions today.
Hear From a Peer – A Customer Case Study
The Head of Information Security and Compliance at leading construction company Morgan Sindall Group shares his experiences of working with Secrutiny and SentinelOne to develop a focused risk remediation programme and combat targeted threats.
Check Out Our Other Recent Posts >
Read this blog, including content from our partner KnowBe4, to learn how you can take your employees from liabilities to assets. Including five recommended actions to fortify them into your organisation’s last layer of security.
Password best practice would have us use a separate complex password for everything, but it’s not that easy. Discover our simple route to robust passwords.
With much of the UK working from home due to COVID-19, malicious actors are taking advantage of the pandemic to find opportunities for distributing their malware to unsuspecting users. This blog will give a high-level overview of campaigns and IOCs discovered by Anomali.