APAC Webcast Series: Building Your 2016 Security Program - 4 Part Series
This March we hosted a series of webcasts to offer tips and insights on building your 2016 Security Program. The series of 45mins webcasts are designed for IT professionals who are involved in planning, design or managing of their day-to-day security programs.
Each of these sessions aim to provide you with key take-aways and a demo preview of how Rapid7 address vulnerability management in your environment, followed by a recorded Question & Answer session with our technical expert. If you have any questions please get in touch - [email protected]
Discover and learn how to improve your security posture as we share with you:
Quick snapshot and review of some of 2015 high-profile breaches and its impact on your organization’s security posture
Steps you should be taking to stay protected against common attack vectors in today’s evolving threat landscape
Key considerations when building your security program budget
Recommended security practices, vulnerability management tools and compliance standards for any security professional
Part 1: Learnings from 2015
Ivan Lee, Sales Engineer, Rapid7
In 2015, the security industry saw high-profile breaches across Asia Pacific (ie. Japan’s pension system, Mandarin Oriental, Kmart Australia) and other known vulnerabilities (ie. VENOM, Stagefright, FREAK). In this session, we explore the vulnerabilities that organizations are exposed to in our world of IP-connected devices that arises from breaches such as advanced evasion techniques, phishing, social engineering attacks, etc...
Part 2: Common Attack Vectors You Should be Aware Of
Ivan Lee, Sales Engineer, Rapid7
Cyber security is evolving at an alarming rate. As the threat landscape evolves, so must your approaches to keeping your information secure. In this session, we'll take a look at SSL vulnerabilities and various web application exploits such as XSS and SQL injection. Come, join us and take away useful tips that can help you improve your security posture in 2016.
Part 3: Building Your Security Program Budget
Jane Man, Product Strategy Manager, Rapid7 & Roy Robinson, Product Platform Manager, Rapid7
Gartner states that security teams spend about 10% of their budget today on security products focused on detecting attackers within their network and they see that changing to 75% of their budget by the year 2020. As security teams come to realize that it is almost impossible to prevent every attack against their network and users, they will start to rebalance their security dollars to invest more heavily in detection products. Join us to learn more.
Part 4: Keeping Safe With Best Practices, Tools & Standards
Ivan Lee, Sales Engineer, Rapid7
Improving your organization's security posture requires you to know your weak points, prioritize what matters most and improve your outcomes continuously. In this session, we'll take a look at how recommended best practices, vulnerability management tools and compliance standards come together to reduce your risk of breach.
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.
If you continue to browse this site without changing your cookie settings, you agree to this use.