Vulnerability Management: Work Smarter Not Harder “The Data Problem”

Presented by Kenna Security

With an exponential increase in the volume and velocity of new vulnerabilities, it is no wonder that today’s InfoSec and operations teams find it difficult, if not impossible, to meet the increasing demands of remediation. This doesn’t even include internal corporate policies or politics which present significant barriers as well. It is not uncommon to discuss a prospective customer’s VM program with them, only to find out that they are using spreadsheets to manage the load. They then hand off their “prioritized” workload to a group of admins who are not bound to the same policies or procedures. The average enterprise today has 100’s of thousands to millions of vulnerabilities spread across tens of thousands of assets. A great many of these organizations continue to rely on CVSS scoring as the only benchmark. The latest research shows us that if you base your remediation strategy on fixing CVSS 7 or greater, your efforts will yield the same effectiveness as randomly choosing any set of active vulns in your environment to address. It is about 22% effective in either scenario. The purpose of this presentation is to discuss and explore more effective ways to address such challenges and roadblocks. In particular, how does a practitioner better prioritize and communicate with their various internal colleagues to improve their workflow and posture?

How Can a Diverse Workforce Contribute to the Success of Your Business?

Moderated by INTERFACE Advisory Council

Now, more than ever, the workforce is comprised of a diverse group of talented professionals. With more women in the tech industry than ever before and a broad range of generations bringing different work styles and values to the table, ultimately organizations can benefit from having a diverse group of individuals on their team.

Join our panel discussion as we discuss the tech landscape, workforce diversity and how to hire and retain top talent to obtain the high achieving teams we desire.

Panelists:

Deveeshree Nayak • Instructor, University of Washington Tacoma

Alicia Evans • Metro Market Manager, Robert Half Technology

Integrated Risk Management

  Presented by ServiceNow

Organizations need to transform inefficient processes by combining security, IT, and risk capabilities into an integrated risk program which provides continuous monitoring, prioritization, and automation to ensure rapid identification and response to risks.

Exploitation of IT Vulnerabilities is Escalating

  Presented by Quest Software

Cybercriminals are savvier than ever. They understand that IT complexities create serious vulnerabilities, and these criminals are continually developing new ways to breach your organization’s boundaries. That is why a proactive, unified endpoint management (UEM) strategy should be part of your organization’s core business strategy.

Exploitation of IT Vulnerabilities is Escalating

  Presented by Quest Software

Cybercriminals are savvier than ever. They understand that IT complexities create serious vulnerabilities, and these criminals are continually developing new ways to breach your organization’s boundaries. That is why a proactive, unified endpoint management (UEM) strategy should be part of your organization’s core business strategy.

How Security Leaders Gain Trust in the Boardroom

  Presented by Kudelski Security

Security Leaders need a solid and comprehensive approach in communicating their cybersecurity programs. Kudelski Security surveyed CISOs, CSOs, and CIOs about communicating their cybersecurity program with their Board of Directors. The collective responses provide insight into what interests boards the most, suggested strategies and metrics that resonate when answering the board’s most challenging questions. A summary of the research will be provided to all participants in hardcopy booklet format.

Exploitation of IT Vulnerabilities is Escalating

  Presented by Quest Software

Cybercriminals are savvier than ever. They understand that IT complexities create serious vulnerabilities, and these criminals are continually developing new ways to breach your organization’s boundaries. That is why a proactive, unified endpoint management (UEM) strategy should be part of your organization’s core business strategy.

Exploitation of IT Vulnerabilities is Escalating

  Presented by Quest Software

Cybercriminals are savvier than ever. They understand that IT complexities create serious vulnerabilities, and these criminals are continually developing new ways to breach your organization’s boundaries. That is why a proactive, unified endpoint management (UEM) strategy should be part of your organization’s core business strategy.

Exploitation of IT Vulnerabilities is Escalating

  Presented by Quest Software

Cybercriminals are savvier than ever. They understand that IT complexities create serious vulnerabilities, and these criminals are continually developing new ways to breach your organization’s boundaries. That is why a proactive, unified endpoint management (UEM) strategy should be part of your organization’s core business strategy.