Webinar Replay – From Reactive to Proactive: Security Optimization and Threat-Informed Defense

Webinar Replay – From Reactive to Proactive: Security Optimization and Threat-Informed Defense

There are plenty of cybersecurity and compliance solutions—too many, in fact. CISOs and their teams are drowning in data, but they have a hard time identifying which tools actively improve their risk posture, and which are, at best, expensive window-dressing.

This webinar highlights the importance of threat-informed defense, and applies it to the notion of enterprise risk optimization. We discuss how CISOs and their teams can use threat-informed defense as a way to optimize their cybersecurity investments, improve compliance posture, and move up the maturity model from reactive to proactive and anticipatory. We cover:

• The cybersecurity maturity model and what it takes to improve operational cybersecurity maturity
• How aligning with third-party organizations such as MITRE ATT&CK can help organizations take a threat-informed approach to risk minimization
• How threat-based risk data can turbocharge compliance efforts
• How to move to a risk-based investment strategy when it comes to procuring cybersecurity tools and technologies

Participants will come away with an understanding of threat-based defense and the MITRE ATT&CK framework, and how it can help streamline cybersecurity operations and optimize cybersecurity investments.

Who should attend: Cybersecurity and risk management professionals; business professionals concerned about cybersecurity; network technology professionals

From Reactive to Proactive: Security Optimization and Threat-Informed Defense

Presented by: Johna Till Johnson, CEO & Founder, Nemertes Research
Julie O’Brien, Chief Marketing Officer, AttackIQ
Date: August 25, 2020
Time: 2:00 pm ET

Share this post