Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

E-Header-desktop-Cybovate
Forums it-sa Expo Knowledge Forum D

The experience of 20,000 penetration tests

Traditional security verification methods are ineffective; embracing new approaches is crucial for continuous improvement.

calendar_today Wed, 11.10.2023, 13:00 - 13:15

event_available On site

Action Video

south_east

Action description

south_east

Speaker

south_east

Themes

Managed Security Services / Hosting Network Security / Patch Management SIEM / Threat Analytics / SOC

Key Facts

  • Autonomous Pen Testing
  • Continuous verification of security posture
  • Purple Team Approach

Event

This action is part of the event Forums it-sa Expo

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

Organizations often employ a variety of tools to secure their environment, many of which are designed to address specific problems without integration. The traditional method of security verification, such as expensive quarterly or annual penetration tests, provides an incomplete understanding of their security posture.

To address this, new approaches are crucial. Continuous verification of security posture is essential, evaluating the collective effectiveness of all tools. The most effective approach involves realistic scenario testing from an attacker's perspective.

Horizon3.ai offers the ideal tool to support this approach, utilizing autonomous penetration tests that simulate an attacker with access. This approach enhances both security posture (identifying vulnerabilities and misconfigurations) and the coordination of tools and teams in the event of an attack.
... read more

Language: German

Questions and Answers: No

close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.