Higher Ed Demo Day: Automate Cyber Risk Management with Cyber Threat Intel

Logo
Presented by

Eric Smith, CISSP

About this talk

Earlier this year the research firm Gartner identified Top Technology Trends impacting Higher Education and incorporating cyber threat intelligence into their overall cybersecurity risk management was one of those trends. In this demo day webinar see how FortifyData can simplify the collection of cyber risk information across the University and Colleges to automate the prioritization process with the help of integrated cyber threat intelligence (CTI). Cyber threat intelligence is a dynamic risk factor that can affect the cyber risks Higher Education institutions are facing, depending on APT group activities or Known Vulnerability Exploits (KVE) being targeted within your IT asset inventory. FortifyData monitors the CTI and updates your prioritized cyber risks based on the CTI. Cyber risk prioritization helps Universities identify the most impactful cyber risk that their teams, or outsourced teams, should focus on. Learn how FortifyData is helping Higher Education institutions automate the cyber risk assessments of Colleges and Departments to produce both a University-wide view of cyber risk and a localized view by College or Department. Register to see the advantages our current Higher Education clients are gaining, and attendees will learn: - How cyber threat intelligence helps inform risk-based vulnerability management - How to construct views to measure cyber risk by College or Department - Understanding compliance with the Safeguards Rule and other regulations - Identify external cyber risk within your service provider/vendor ecosystem and the role of this information in supplementing and validating questionnaires
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (6)
Subscribers (1137)
FortifyData is an industry-leading Continuous Threat Exposure Management (CTEM) company that enables the enterprise to manage cyber risk across the organization. By combining automated attack surface assessments with asset classification, risk-based vulnerability management, security ratings and third-party risk management, you get an all-in-one cyber risk management platform. Follow our channel to learn how we give organizations a 360-degree view of their cyber risk exposure through provisioning comprehensive external and internal technology assessments, compliance-based control assessments, and collaborative third-party risk management solutions.