Vulnerability Assessments eSummit
Event Agenda

Registration is free!
Watch this space for updates and announcements!

12:00 PM ET
Vulnerability Assessment eSummit Opens!

12:10 PM - 1:00 PM ET
KEYNOTE: Debunking the FUD from Vulnerability Assessments
Nicholas Takacs,
Partner, ConservaTech, LLC

Fear, uncertainty and doubt have become the go-to selling points for security products, especially vulnerability assessments and management solutions. Using the "unknown" becomes a convenient avenue to push a specific product or service rather than offering a true solution to address current, ongoing and hypothetical threats. The existence of a vulnerability does not guarantee the ability of an attacker to exploit, nor does it guarantee a breach will occur. With all of this in mind, we need to re-frame the conversation around vulnerabilities and how we assess, remediate and manage the underlying systems. The "FUD" factor should no longer be an acceptable approach, even when the audience might not have a suitable level of experience. Looking at vulnerability management as an integrated component of a larger systems management process can help to reduce anxiety and frustration around these ongoing security controls. This keynote session will offer a path of enlightenment from the traditional focus points to a modern, integrated approach.

1:00 PM - 1:10 PM ET
BREAK

1:10 PM- 2:10 PM ET
WEBCAST: All Is Not Quiet on the Cybersecurity Front: A View of Vulnerability Management From the Trenches
Joakim Kennedy,
Threat Intel Manager, Anomali  

It is almost 2020 and we live in a world where you cannot connect an unpatched machine to the internet without it being compromised within minutes. It’s as if these devices are charging defenselessly into an internet “no man’s land” instead of sheltering in a foxhole. As practitioners, we are constantly seeing malware and threat actors trying to exploit machines, and in many instances, with vulnerabilities that were disclosed years ago. Given that we are not seeing them slowing down, we have to assume they are successful! In this presentation, we will take a look at the problem of unpatched machines and potential ways of solving this issue, from someone that is in the trenches constantly tracking threat activities. We hope you take this information and make it a little quieter on the cybersecurity front.

2:10 PM - 2:20 PM ET
BREAK

2:20 PM - 3:00 PM ET
WEBCAST: Optimizing Your Vulnerability Management Workflow Within One Platform
Chris Carlson, Vice President of Strategy, Qualys

In this age of instant gratification, businesses are finally able to catch up with their desire to have everything identified, prioritized, and remediated in real time. Practitioners can utilize the vulnerability detection and remediation cycle to establish efficient closed-loop processes for their organizations. Find out how to get started when you are staring down a mountain of vulnerability data. Learn how to sift out remediation processes with ease by spending time on the right vulnerabilities. See how sharing simple and actionable insights with your colleagues and executive team provides the assurance they need to know their vulnerability detection and remediation is accurate and in good hands. 

3:00 PM -3:10 PM ET
NETWORKING BREAK IN EXHIBIT HALL

3:10 PM ET
Vulnerability Assessment eSummit closes!

 

(ISC)² members: (ISC)² members who attend CyberRisk Alliance virtual events or eSummits may be eligible for one CPE credit each applicable webcast subject to (ISC)² approval. Please refer to (ISC)² Guidelines before reporting CPE activity directly on www.ISC2.org

 

By registering for this event, I agree to receive information from CyberRisk Alliance the event sponsors.