Learn how industry leaders approach patch management best practices

Patch management is a continually shifting target that requires IT and Security teams to align their priorities—a task easier said than done. Merely conducting scans and passing the information to another department, expecting them to take action, is untenable. Therefore, CISOs and CIOs need an actionable, risk-based approach to reduce the risk of exploitable vulnerabilities and prioritize their most critical assets within their digital environments.

Don’t miss this unique opportunity to hear industry experts share their best advice on what IT and security leaders need to know to protect their entire IT environment from growing threats through effective patch management. 

Key topics:

  • Enhancing Federal Browser Security
  • The ROI of Patch Management
  • Aligning ITOps & Security Priorities
  • When Patching Isn’t Enough

July 31, 2024
9:00 AM – 12:00 PM PT

You’re registered!

Add to calendar REGISTER

Something went wrong. Please try again.

Join us at the next Cyber Risk Series to learn how to protect your entire IT environment from growing threats with effective patch management.

Featuring

Graham Cluley
Smashing Security

Sean Atkinson
CISO
Center for Internet Security

Adam Gray
CTO
Novacoast

Derek Fisher
Product Security, Enterprise Security & Risk Management
Published Author

Eran Livne
Senior Director, Product Management, Remediation
Qualys

Agenda

9:00 AM PT

Welcome to the Cyber Risk Series!

Join us as we delve into remediation and patching and sessions packed with expert insights, thoughtful discussions, and actionable strategies.

Graham Cluley
Smashing Security

9:30 AM PT

Balancing Risks, Rewards, and Remediation

Proactive patch management is crucial for balancing threat mitigation and business continuity. Reactive patching exposes organizations to vulnerabilities and disrupts operations.

In this session, Sean will discuss approaches to integrating risk assessment with patch management to achieve:

  • A comprehensive approach to identifying and prioritizing vulnerabilities
  • Streamlined communication between IT and security teams
    Strategic decision-making on when and when not to patch, minimizing business disruption
  • Analyze industry data on patching to evaluate its effectiveness and impact

Discover how this risk-based framework ensures sustainable, effective patch management, aligning IT operations and security priorities to stay ahead in a constantly evolving threat landscape.

Sean Atkinson
CISO
Center for Internet Security

11:00 AM PT

Mitigating Risks in Healthcare: The Role of Exploitability in Patch Management

Understanding and mitigating cybersecurity risks is crucial for patient and organizational security in the healthcare sector. Join Derek Fisher as he explores the concept of exploitability and its impact on healthcare organizations. Learn how to identify and prioritize vulnerabilities by focusing on their actual risk to your organization. This session will cover:

  • Balancing risk by using exploitability to determine which vulnerabilities need immediate attention.
  • Building efficient workflows for remediation, ensuring critical vulnerabilities are addressed promptly.
  • Overcoming challenges in healthcare, such as limited budgets, legacy systems, and low-tech adoption.

Discover how a strategic patch management approach can enhance healthcare security and operational efficiency.

Derek Fisher
Product Security, Enterprise Security & Risk Management
Published Author

11:30 AM PT

Proactive Risk Mitigation Through IT and Security Alignment

The escalating cost of cybercrime, predicted to reach $9.5 trillion in 2024 and exceed $10.5 trillion in 2025, underscores the critical need for IT and security team alignment. Join us as we share best practices on how organizations of every size can significantly reduce risk by improving and optimizing Security—IT remediation relationships.

This session will cover:

  • Smart Automation: Learn how to leverage automation in a way both IT and Security teams will benefit from.
  • Collaboration and Communication: Discover strategies to bridge communication and collaboration gaps between IT and security teams, ensuring a unified approach towards common goals.
  • Risk Management: Explore continuous vulnerability risk management strategies to align IT operations with stringent security objectives, making your systems robust and less prone to attacks.

Gain actionable insights and practical strategies for aligning IT and security teams, optimizing resilience, and minimizing security risks across your organization.

Eran Livne
Senior Director, Product Management, Remediation
Qualys