Exclusive Content:

The Enterprise Guide to Building a Better CX Strategy

Enterprise brands have nearly 10,000 marketing technology solutions to...

Top 6 ways Cisco prevents ransomware with EPP & EDR

Here are the top 6 ways that Cisco protects...

xMatters overview sep 7 2021, 8:00 am – 8:30 am PST

Without defined processes to manage issues, any failure –...

Government Department Gains Critical Insight Into Their Security Posture

CISO demands second opinion after internal reporting showed zero vulnerabilities

Security testing within a large government department was dispersed and then performed by various teams. Pentesting was required, but each division operated somewhat independently and hired testers with various skill levels. Results were inconsistent and data from testing was trapped in written reports, not structured data. The CISO could not easily determine the quality of testing, remediation status, or the need for security improvements.

Pentest reports filed by several of the agency’s divisions consistently indicated no major vulnerabilities found. Yet, one of those divisions found itself in the headlines for a major cybersecurity breach.

The problem was that asset owners could block security testing. While the CISO was responsible for overseeing the testing process, only asset owners could grant access for safe testing. The CISO had to find a new way to perform penetration testing across the agency and convince the rest of the agency’s security community that it was the right approach. Willing and enthusiastic support from the divisions’ security community was essential for the new testing program to work.

Download Government Department Gains Critical Insight Into Their Security Posture Whitepaper

federal-agency-gains-critical-insight-into
By submitting this form, you’re providing consent for ITTech News to use the information supplied as outlined in our privacy policy. This includes providing access to this download and sharing the information. Please check our privacy policy to see how we protect and manage your submitted data.

Newsletter



Don't miss

DOD exploring requirements for managed service providers under CMMC

The Department of Defense has created a new framework...

Solving the cyber talent gap with diverse expertise

Multiple and Diverse Perspectives are Critical for Securing Your...

The road to agent experience maturity: A self-assessment

Improve retention by measuring agent satisfaction With the challenges impacting...

Top 5 Benefits of Managed IT Services

When you're setting up a company, the technology considerations...

AI and IoT: A partnership that works

You might have wondered why you view house listings...

The Enterprise Guide to Building a Better CX Strategy

Enterprise brands have nearly 10,000 marketing technology solutions to choose from whenbuilding their CX stacks. But even with so many tools at their fingertips, they...

Top 6 ways Cisco prevents ransomware with EPP & EDR

Here are the top 6 ways that Cisco protects organizations from ransomware and other cyber threats. Download now

xMatters overview sep 7 2021, 8:00 am – 8:30 am PST

Without defined processes to manage issues, any failure – no matter how minor or anticipated – can increase costs, affect customers, and reduce the...
Subscribe To Our Newsletter

Join our mailing list to receive the latest news and updates from our team.