Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Security: Monitor, React, or Pay the Price

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

Infosecurity Magazine collects personal information when you register for our magazine and sponsored content. We will use this information to deliver the product or service for which you are registering.

We will also share your information with the declared sponsor of any webinar, whitepaper or virtual event for which you register and this sponsor is clearly indicated on each event page. You can opt out at any time in your user account.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions and privacy policy.

As new vulnerabilities are disclosed every day, new systems spinning up every minute, and the data you need to protect increasing by the second, the ability to monitor IT infrastructure for weakness is fundamental to knowing that a breach couldn’t occur - or hasn’t already happened.

With this new threat landscape it’s critical that organisations ensure their security controls are working effectively and efficiently.

And when a control fails, they need the indicators of the failure identified quickly, to reduce the likelihood of any loss of confidential data.

In this webinar we will aim to:

  • Understand where the true threats reside within the infrastructure.
  • Discover the effective metrics that can be applied to your security controls to gain insight into how each part of the organisation is performing, and where holes in the security program are.
  • Look at how to communicate the value of the security controls upwards to management and expectation downwards to the technical team to secure budget and reduce the risk of cyberattack.
  • And assess which indicators of compromise should be monitored for when the controls fail.


Jack Daniel

Strategist, Tenable

    Ionut Ionescu

    Ionut Ionescu Advisory Board Member, (ISC)²

      Paul Midian

      Paul Midian Chairman, CREST & Director, PwC

        Gavin  Millard

        Gavin Millard EMEA Technical Director, Tenable

          Stephen Pritchard

          Moderator, Infosecurity Magazine

            Brought to You by

            Should you register for this event your information will be shared with the sponsor indicated above. See our privacy policy for more information.