Loading Events

Understand What Matters – The New Approach to Assessing, Quantifying, Prioritizing, and Reducing Cybersecurity Risks to the Business

Home » Events » Understand What Matters – The New Approach to Assessing, Quantifying, Prioritizing, and Reducing Cybersecurity Risks to the Business

  • This event has passed so registration is closed.

Sponsor

Details

Date and Time

August 10, 2021 @ 1:00 pm - 2:00 pm EDT

Event Category

Web Conference

Organizer

Roxanne Pirooz

Contact

Anne Rogers

Overview

Today’s security teams navigate significant layers of complexity, contending with too many different standards and too many disparate technologies. The proliferation of technologies and terminology, in turn, generates a broader challenge: getting teams across the organization to speak plainly and generate consensus about risks to the business, all using a common language.
The reality is that too often there’s a fundamental gap between the cybersecurity strategy and business goals and priorities that conspires against the success of each of these roles.
Join us to learn how your organization can begin to achieve a common language and align priorities for reducing risk by employing risk-based vulnerability management, and by establishing a model for cyber risk quantification (CRQ) within the enterprise.
During the webinar we’ll discuss:

  • Why a risk-based vulnerability management approach enables you to drive down and prioritize the risks that pose the gravest threats to the business
  • A new, proposed model for quantifying cyber risks
  • How a simple calculation and defining three key terms can provide a blueprint for aligning the organization
  • How the model can be applied in less mature and in more mature organizations
  • Which technologies will best support your cyber risk quantification efforts

Moderator

Alex Grohmann – Founder, Sicher Consulting

As a security and privacy professional for over 25 years, Alex Grohmann as helped to promote the profession through professional and personal contributions. He is currently the Chief Information Security Officer (CISO) for Acuity International, a $550 million organization with locations in over 10 countries. He volunteers a great deal of his time to make the profession stronger through his efforts in ISSA.

During Alex’s time on the international board, has been the lead for the Privacy Special Interest Group (SIG), managing the group and the efforts along with the chairs. The SIG has grown to nearly 2,000 members in the few short years of its existence.

As a 20-year member of the Northern Virginia chapter, Mr. Grohmann has volunteered on its board for 9 years, with 3 of those as chapter president. During that time, the chapter won the Chapter of Year, and he collected the Honor Roll and Fellow designations.

Outside of ISSA, Alex has served on several boards and/groups including Washington DC InfraGard, NIST’s NICE and the IT-Sector Coordinating Council (IT-SCC).

Alex is a graduate of Florida State University in Management Information Systems, and a proud Seminole.

See Alex Grohmann‘s full profile.

Speaker/s

Valeriy Leykin – Director of Product, SafeBreach

Valeriy Leykin has more than a decade’s worth of experience in software development and more than seven years in product leadership both in start-up and enterprise environments where he has ideated and built innovative products aimed at improving efficiency and user experience. Prior to his time at SafeBreach, Valeriy served as a Product Owner at McAfee and a Software Engineer at Intel.

See Valeriy Leykin‘s full profile.

Yotam Ben Ezra – Vice President of Product, SafeBreach

Yotam Ben Ezra joined SafeBreach from Radware (RDWR) where he led the security product line from early days until it became a major line within the Radware business. His earlier background is in security research where he led security research teams at Radware and Checkpoint (CKPT). Yotam holds a B.Sc Degree in Physics and Computer Science from King’s College London.

See Yotam Ben Ezra‘s full profile.

ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.

Scroll to Top