Risk-Based Vulnerability Management: The Race Against Risk | SASIG
Forgotten your password?

Tuesday 31 March 2026, 11am-12noon (GMT)

Exposure is accelerating faster than most security programmes can adapt. Expanding attack surfaces, cloud sprawl, identity-driven threats, and weaponised vulnerability intelligence are flooding teams with data, yet breaches still start with exposures that were already known. The question is no longer only whether you can detect threats, but whether you can remove the conditions that let them succeed.

We explore how modern Exposure Management strengthens Detection and Response by shifting left of the alert. By operationalising Discover, Prioritise, and Control, organisations reduce what later demands triage and response.

We also cover how RBVM expertise turns technology into outcomes through better prioritisation, feedback loops and metrics that prove progress over time.

If you are a member of ISACA, ICA or The Security Institute, you can earn CPE/CPD points for attending our webinars live. Remember to log your attendance with your provider to be credited.

 

Guest chaired by

Alison Jiggins (info), Awareness and Training Manager, Hogan Lovells 

 

Presented by

Paul Jones (info), Solutions Marketing Manager, Kudelski Security
Nathan Shock (info), Director – Cybersecurity Operations Services, Kudelski Security

 

By registering for this webinar you agree:

  • The speakers’ organisations may use your details to enhance your experience and email you further information of interest. Please see our Privacy Policy for further details. 
  • To follow the standard of behaviour set out in SASIG’s Safe Space Charter

 

Interested in attending?

Log in to register with one click and add this event to your calendar. Not yet a member? Click the link below to create an account. Applications for SASIG membership are usually reviewed within two working days.


Login / apply for SASIG membership

Register for this webinar as a guest

Don’t have a website account?

Review the advice on using Zoom and other webex platforms securely here.

This website uses cookies, by continuing to use the site you agree to using cookies. Continue