See what you’re missing: Modelling your attack surface in three easy steps | SASIG
Forgotten your password?

Wednesday 1 May 2024, 11am-12noon (BST)

A recent global survey of CISOs, CIOs, and senior security leaders revealed that the single biggest challenge faced by organisations was complexity – namely a lack of understanding of what they have and, therefore, what they need to protect. 

The sheer complexity of today’s IT, OT, and IoT systems is overwhelming and presents a growing target for attackers. But creating a detailed inventory and building a model of your infrastructure can significantly enhance your organisation’s security posture.

In this webinar, we will explore the strategic process of creating an inventory and constructing a model of your technology landscape.

Join us to discover how this approach has the potential to elevate your organisation’s security posture with proactive threat detection, automated compliance analysis, and streamlined security change processes.

If you are a member of ISACA, ICA or The Security Institute, you can earn CPE/CPD points for attending our webinars live. Remember to log your attendance with your provider to be credited.

 

Guest chaired by

Sharon Penfold (info), Director of Technology Transformation, De Montfort University

 
Presented by

Peter Hughes (info), Technical Director, Skybox Security

Interested in attending?

Log in to register with one click and add this event to your calendar. Not yet a member? Click the link below to create an account. Applications for SASIG membership are usually reviewed within two working days.


Login / apply for SASIG membership

Register for this webinar as a guest

Don’t have a website account?

Review the advice on using Zoom and other webex platforms securely here.

This website uses cookies, by continuing to use the site you agree to using cookies. Continue