See what you’re missing: Modelling your attack surface in three easy steps | SASIG
Forgotten your password?

Wednesday 1 May 2024, 11am-12noon (BST)

A recent global survey of CISOs, CIOs, and senior security leaders revealed that the single biggest challenge faced by organisations was complexity – namely a lack of understanding of what they have and, therefore, what they need to protect. 

The sheer complexity of today’s IT, OT, and IoT systems is overwhelming and presents a growing target for attackers. But creating a detailed inventory and building a model of your infrastructure can significantly enhance your organisation’s security posture.

In this webinar, we explored the strategic process of creating an inventory and constructing a model of your technology landscape.

We discovered how this approach has the potential to elevate your organisation’s security posture with proactive threat detection, automated compliance analysis, and streamlined security change processes.

 

Guest chaired by

Sharon Penfold (info), Director of Technology Transformation, De Montfort University

 
Presented by

Peter Hughes (info), Technical Director, Skybox Security

Log in to watch the webinar on demand


Log in here
This website uses cookies, by continuing to use the site you agree to using cookies. Continue