Products Services Support & Resources Research

V2 Security Summit 2023

DATE: 10 - 11 May, 2023
LOCATION: Rapid7 Booth 901, Øksnehallen, Copenhagen, Denmark
Manage Risks and Eliminate Threats with Rapid7
Rapid7 unites cloud risk management and threat detection to deliver results that secure your business and ensure you’re always ready for what comes next. Reduce your attack surface and eliminate threats with zero tradeoffs.

Learn more about Cloud Risk Complete
Cloud Risk Complete delivers cloud security along with unlimited vulnerability management and dynamic application security testing, all with a single subscription.
Learn More about Threat Risk Complete
Managed Threat Complete delivers managed detection & response and unlimited vulnerability management, all with a single subscription. Attackers don't stop at the endpoint, and neither can your MDR.

Speaker Slot


Jason-Hart.jpeg

Jason Hart

Chief Technology Officer, Rapid7

10 May 2023, 2.15pm

Meet us at V2 2023 

Would you like to book a meeting with one of our team members during V2 Security in Copenhagen?
Fill out the form below and we will get in touch with you at the earliest. 

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nullam mollis lacus .

Register Now

Agenda

Day Agenda

3 pm - Arrival plus Coffee & Tea
3.30 pm - Round Table Part 1
4.30 pm - Break
4.45 pm - Round Table Part 2
5.45 pm - End
6 pm - Reception & Dinner

Round Table Agenda

The below agenda covers a 5 stage plan that will be drafted during the roundtable aligned to your business. The output will provide you with a draft Target Operating Model that will enable Cybersecurity to form part of your business process to maintain and manage the operational cost of Cyber Security and effectively manage risks for the business.
The plan will include but not limited to the below details: 

Stage 1
Mapping your current Cybersecurity Operating Model and identifying gaps

Stage 2
Understanding your non technical security challenges and mapping security technology to business process and operations

Stage 3
Drafting of a Cyber security strategy with clearly defined objectives and goals

Stage 4
Clearly define Cyber Security KPIs that will highlight technology, process and or people's effectiveness

Stage 5
Drafting of Protection level Agreements to measure the effectiveness of operationalising cyber security

WEBCAST

Thank Lorem ipsum dolor sit amet, consectetur

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Cras et nulla ligula. Maecenas commodo turpis non nisi rhoncus, non gravida ligula ornare. Quisque nulla ante, malesuada ut vestibulum eu, congue id mauris. Cras eu metus risus.

EXPLORE WEBCASTSor go back to homepage
...

CUSTOMER SUPPORT
+1-866-390-8113 (Toll Free)

SALES SUPPORT
+1-866-772-7437 (Toll Free)

Need immediate help with a breach?

+1-866-772-7437

SOLUTIONS
All Solutions
Industry Solutions
Compliance Solutions

SUPPORT & RESOURCES
Product Support
Resource Library
Customer Stories
Events & Webcasts
Training & Certification
IT & Security Fundamentals
Vulnerability & Exploit Database

ABOUT US
Company
Diversity, Equity, and Inclusion
Leadership
News & Press Releases
Public Policy
Open Source
Investors

CONNECT WITH US
Contact
Blog
Support Login
Careers