Products Services Support & Resources Research

Nordic Virtual Lunch & Learn Session

A recipe for a stronger security posture with Rapid7 Exposure Management

Date: Friday, 17th October

Time: 12:00 PM CEST (1h)

Location: Virtual Zoom


Got a lot on your plate? So do we.

Imagine our digital kitchen, a bustling dinner party, overflowing with new ingredients (digital assets). Security chefs struggle with decreasing visibility, creating blind spots that make preparing a safe meal challenging.


Join Rapid7 experts Christian Jacobsen and Louise Andersson for a one-hour lunch webinar where they'll share their recipe for a stronger security posture with Rapid7 Exposure Management. It's time to stop just reacting and start grilling threats.


We'll show you how to:

  • See the threats hiding in plain sight with a complete view of your attack surface.
  • Turn the heat up on NIS2 compliance, transforming it from a chore into your secret ingredient for success.
  • Keep your cloud-native and container environments sizzling without getting burned.

A gift from us:

As a token of appreciation for your time, everyone who attends the session will receive a EUR 20 gift voucher.


This isn't just a webinar; it's a taste of what a proactive security strategy can do. Don't miss out.


Register now and let's cook up a winning security strategy.


Speakers

Christian-Jacobsen.jpeg

Christian Jacobsen

Exposude Command Management Lead


Louise Andersson

Nordics Account Executive 

Register now to save your space

All registrations are subject to approval.


Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nullam mollis lacus .

Register Now

Agenda

Day Agenda

10 am - Arrival plus Coffee & Tea
10.30 am - Round Table Part 1
12.30 am - Lunch
 1.45 pm - Round Table Part 2
 3.45 pm - End

Round Table Agenda

The below agenda covers a 5 stage plan that will be drafted during the roundtable aligned to your business. The output will provide you with a draft Target Operating Model that will enable Cybersecurity to form part of your business process to maintain and manage the operational cost of Cyber Security and effectively manage risks for the business.
The plan will include but not limited to the below details: 

Stage 1 - Mapping your current Cybersecurity Operating Model and identifying gaps
Stage 2 - Understanding your non technical security challenges and mapping security technology to business process and operations
Stage 3 - Drafting of a Cyber security strategy with clearly defined objectives and goals
Stage 4 - Clearly define Cyber Security KPIs that will highlight technology, process and or people's effectiveness
Stage 5 - Drafting of Protection level Agreements to measure the effectiveness of operationalising cyber security

WEBCAST

Thank Lorem ipsum dolor sit amet, consectetur

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Cras et nulla ligula. Maecenas commodo turpis non nisi rhoncus, non gravida ligula ornare. Quisque nulla ante, malesuada ut vestibulum eu, congue id mauris. Cras eu metus risus.

EXPLORE WEBCASTSor go back to homepage
...

CUSTOMER SUPPORT
+1-866-390-8113 (Toll Free)

SALES SUPPORT
+1-866-772-7437 (Toll Free)

Need immediate help with a breach?

+1-866-772-7437

SOLUTIONS
All Solutions
Industry Solutions
Compliance Solutions

SUPPORT & RESOURCES
Product Support
Resource Library
Customer Stories
Events & Webcasts
Training & Certification
IT & Security Fundamentals
Vulnerability & Exploit Database

ABOUT US
Company
Diversity, Equity, and Inclusion
Leadership
News & Press Releases
Public Policy
Open Source
Investors

CONNECT WITH US
Contact
Blog
Support Login
Careers