Kenna and TransUnion: How TransUnion Moved to a Risk Based View of Vulnerability Management

September 28, 2016
TransUnion CISO Jasper Ossentjuk believes that with the increased pace of automated and targeted attacks, InfoSec teams have to work smarter—not harder. That means the old methods of vulnerability management—scanning, then manually parsing through results using pivot tables—no longer work. That's especially true when Jasper needs to report his organization's overall risk exposure to the board; his non-technical peers need reporting that's metric-based and visual, not arcane spreadsheets. In this webinar, find out how Jasper and his team automated key components of vulnerability management while moving to a risk-based view that dramatically saved time, enhanced team efficacy, and equipped Jasper with high-level reporting that enabled him to share his team's results with his executive peers. Jasper's co-presenter is Ed Bellis, CTO and co-founder of Kenna Security (and former CISO at Orbitz).
Previous Article
Predicting the Risk of Vulnerability Exploits: The Missing Piece of the Cyber Risk Management Puzzle
Predicting the Risk of Vulnerability Exploits: The Missing Piece of the Cyber Risk Management Puzzle

Security professionals know that they can’t close every vulnerability and prevent every threat. Despite adv...

Next Article
Some Highlights From RSA 2018
Some Highlights From RSA 2018

This years’ RSA Conference was massive, gathering more than 40,000 attendees and over 500 vendors to showca...