The Age Of Automation In Security Control Validation

Technologies And Best Practices In Cybersecurity Control Validation

Continuous vigilance is now possible for validation of enterprise security controls. Whether necessary for regulatory or policy compliance, on-going penetration testing assures your organization is examining the latest threats.

We respect your privacy, by clicking ‘Watch On Demand’ you agree to receive our e-newsletter, including information on Podcasts, Webinars, event discounts and online learning opportunities. For further information on how we process and monitor your personal data click here. You can unsubscribe at anytime.

This FREE webinar was recorded on:
February 12, 2020
02:00 PM - 02:00 PM EST

The need to continuously test the enterprise IT network is imminent and the existing solutions are falling short in doing so at scale. Organizations need assistance to close the gap between policy and practice in network security controls. 

In 2020, a major leap in technology allows enterprises to continuously prioritize remediation efforts and focus only on the 1% of breachable vulnerabilities and control misconfiguration that have critical business impact.

In this Pcysys webinar hosted by Cyber Security Hub, you will learn:

  • A fresh approach to risk-based vulnerability remediation prioritization
  • How to ensure your security posture is kept 24/7 in an ever-changing IT network
  • How to leverage your team to do more to improve your cyber resilience

Not able to attend the live event? Register to receive a link to the on-demand playback!

Presenters:

Ran Tamir
VP Products
Pcysys

Ran Tamir is a Cyber Security Product Management veteran with over 15 years of experience building cyber security products such as Traps (acquired by Palo Alto Networks), Lacoon (acquired by CheckPoint) and working for companies such as RSA and BMC software. During his tenure, Ran worked for 10 years in Silicon Valley, where he grew security products from inception to mass market adoption in areas of end-point protection, mobile security, identity management & authentication.

Ran holds a B.Sc. in Computer Science and an MBA, both from Tel-Aviv University.

Host:

Jeff Orr
Editor In Chief
Cyber Security Hub

Jeff Orr is a veteran technology strategist, conference producer, and industry analyst passionate about the way people interact with systems and machines through emerging technologies and new user experiences. At Cyber Security Hub, he oversees all editorial direction of its complete portfolio of online products -- as well as engages a network of esteemed industry board members, analysts and key influencers to make CSHub a renowned resource for all things cyber security. Jeff was actively involved in the development and launch of industry-first products, including Wi-Fi and 4G solutions, and leading the wireless strategy for a Fortune 100 entertainment company. His research on emerging technologies includes AI, cyber security, Industrial IoT (IIoT), mobile computing, wearables, and user interfaces.

We respect your privacy, by clicking ‘Watch On Demand’ you agree to receive our e-newsletter, including information on Podcasts, Webinars, event discounts and online learning opportunities. For further information on how we process and monitor your personal data click here. You can unsubscribe at anytime.
Sponsored By: