Building Cyber Asset Management for Today’s Digital Infrastructure

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

15 years into the cloud revolution, we've seen amazing increases in productivity, cost-efficiency, and performance. We're squeezing more from our technology assets than ever before. There's just one problem: we're not keeping track of them.

Hybrid cloud, multi-cloud environments and traditional on-premises software deployments have led to a rise in technology sprawl. With physical and virtual assets now spread between different domains, and with infrastructures relying increasingly on software-defined functions, it's getting harder to know what we're protecting and to track its status.

To address this, we must rethink our approach to IT asset management for the modern computing era. This session will explore what that new approach must look like and how to build it so that we can understand cybersecurity risk across the distributed enterprise.

Key Takeaways

  • How we approach asset management today and why it isn't working
  • How to evaluate your attack surface in a distributed environment
  • How relationship-based asset models can help to expose and mitigate cyber risk
  • Common cyber asset management use cases 

Speakers

Photo of Danny Bradbury

Danny Bradbury

Contributing Writer & North America Webinar Moderator

Photo of Pam Nigro

Pam Nigro

ISACA Board Director and Vice President of Security and Security Officer, Medicision

Photo of Allen Rogers

Allen Rogers

Chief Product Officer & Co-Founder, Noetic

Photo of Larry  Whiteside Jr

Larry Whiteside Jr

Co-Founder and President, Cyversity and CISO, RegScale

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for Noetic here: https://noeticcyber.com/privacy-policy/. Please see Infosecurity Magazine’s privacy policy for more information.