How Asset Management Went From Boring To Top Of Mind

Cyber Security Digital Summit Fall 2019

In this Cyber Security Digital Summit session, learn how to get a complete asset inventory using the tools companies are already using, how to uncover security solution coverage gaps and how to automate policy validation and enforcement.

We respect your privacy, by clicking ‘Watch On Demand’ you agree to receive our e-newsletter, including information on Podcasts, Webinars, event discounts and online learning opportunities. For further information on how we process and monitor your personal data click here. You can unsubscribe at anytime.

This FREE webinar was recorded on:
November 12, 2019
11:30 AM - 12:15 PM EST

In the world of cyber security, asset management has been the boring sibling of more exciting things like threat hunting, deception, and automation. But the foundational challenges of understanding what devices, users, and cloud instances are in our environments have jumped to the top of a CISO's priority list. In this 30-minute session, we’ll look at the challenges around making sure all assets comply with security policies and we’ll discuss:

  • How to get a complete asset inventory using the tools companies are already using
  • How to uncover security solution coverage gaps
  • How to automate policy validation and enforcement

Nathan Burke, Chief Marketing Officer, Axonius

Host:

Jeff Orr
Editor In Chief
Cyber Security Hub

Jeff Orr is a veteran technology strategist, conference producer, and industry analyst passionate about the way people interact with systems and machines through emerging technologies and new user experiences. At Cyber Security Hub, he oversees all editorial direction of its complete portfolio of online products -- as well as engages a network of esteemed industry board members, analysts and key influencers to make CSHub a renowned resource for all things cyber security. Jeff was actively involved in the development and launch of industry-first products, including Wi-Fi and 4G solutions, and leading the wireless strategy for a Fortune 100 entertainment company. His research on emerging technologies includes AI, cyber security, Industrial IoT (IIoT), mobile computing, wearables, and user interfaces.

We respect your privacy, by clicking ‘Watch On Demand’ you agree to receive our e-newsletter, including information on Podcasts, Webinars, event discounts and online learning opportunities. For further information on how we process and monitor your personal data click here. You can unsubscribe at anytime.
Sponsored By:

OUR BENEFACTORS