mlns='http://www.w3.org/1999/xhtml'>
Learn how to prioritize high-risk vulnerabilities
PLEASE JOIN US FOR THE NEXT INSTALLMENT IN THE BLACK HAT WEBINAR SERIES |
|
|
|
Thursday, March 9, 2023 | 11:00 AM PST | 60 Minutes, Including Q+A | With rising concerns about the economy, fragile macroeconomic conditions are keeping business and security leaders up at night. The net result is that security teams are now being asked to maximize existing investments in technology & tooling and effectively do more with less. And yet, the critical vulnerabilities keep coming. The Armis AVM module goes beyond vulnerability scanning to address the full cyber risk management lifecycle. Understand asset risk. Secure vulnerable assets. Control your attack surface. Make sure you know what needs to be prioritized, so teams can fix what matters first. Armis has a better way to prioritize high-risk vulnerabilities for every asset. Manage asset vulnerabilities with a risk-based approach that uses threat intelligence and analytics to correlate asset exposure, the severity of vulnerabilities, and threat actor activity. Join Desiree Lee, Chief Technology Officer, Data at Armis to hear how our customers are protecting their risk landscape, maximizing their tech investments and doing more with less through prioritizing what matters most. |
|
|
|
Desiree Lee Chief Technology Officer, Data Armis Desiree Lee is the Chief Technology Officer (CTO) for Data at Armis. Lee is a seasoned cybersecurity, network, and data storage leader, who has over 14 years of experience working across enterprises, financial institutions, and government authorities. View Full Bio Here |
|
|
|
Terry Sweeney Moderator Black Hat Terry Sweeney is a Los Angeles-based writer and editor who's covered business technology for three decades. He's written about cyber security for more than 15 years and was one of the founding editors of Dark Reading. View Full Bio Here |
|
|
|
|