Breach and attack simulation (BAS) helps businesses automate and scale how they test their cybersecurity defenses. Unlike traditional penetration testing, which offers a point-in-time view of defenses, BAS can assess risk in real time, even as IT environments and networks change and increase in complexity.
Join technology journalist Sean Michael Kerner and Gus Evangelakos of XM Cyber, as they discuss how businesses can use breach and attack simulation to improve security, help meet compliance …
In this second session of our series on risk management, GRC expert Gerard Scheitlin reviews common risk measurement methodologies, along with a discussion of developing risk metrics and a risk appetite. The utilization of a data-driven approach to identifying and quantifying risk will be covered.
After watching this session, you will be familiar with:
• Utilizing common risk metric and quantification techniques
• Developing a risk appetite and …