5 Steps to Security Validation

Jun 15, 2020
60 Min

Title: 5 Steps to Security Validation

Presenters: Major General Earl Matthews (USAF)

Date: On-Demand


Organizations have been managing security based on assumptions, hopes and best guesses for decades. We assume our technology will detect, block and send alerts, we hope our incident response techniques will be efficient and effective when under assault, and we believe that our security teams are well trained and practiced when everything goes wrong. These assumptions result in financial and operational inefficiencies, defensive regression and an inability to determine if we are investing in the right areas to communicate the state of our security effectiveness to stakeholders.

Join this webinar to hear from Retired Major General Earl Matthews (USAF), as he discusses:

  • How to move beyond assumptions with automated and continuous security controls validation
  • Identify and measure vulnerability gaps
  • Manage and suggest remediation steps by arming security practitioners with meaningful evidence
  • Validate an organization's ability to defend itself by using real adversary behaviors

Watch on Demand