Exclusive Content:

How an Asian mobile network operator gained full visibility into the security posture of its 4G and 5G networks

Cyber threats are increasingly persistent, complex, and sophisticated. At...

Harnessing practical automation programs to decouple cost from growth

Manual intensive operations processes are a key cost driver...

3 questions to set your active US SCG distribution strategy

To maximize your team’s selling efficiency, you need to...

Government Department Gains Critical Insight Into Their Security Posture

spot_img
spot_img

CISO demands second opinion after internal reporting showed zero vulnerabilities

Security testing within a large government department was dispersed and then performed by various teams. Pentesting was required, but each division operated somewhat independently and hired testers with various skill levels. Results were inconsistent and data from testing was trapped in written reports, not structured data. The CISO could not easily determine the quality of testing, remediation status, or the need for security improvements.

Pentest reports filed by several of the agency’s divisions consistently indicated no major vulnerabilities found. Yet, one of those divisions found itself in the headlines for a major cybersecurity breach.

The problem was that asset owners could block security testing. While the CISO was responsible for overseeing the testing process, only asset owners could grant access for safe testing. The CISO had to find a new way to perform penetration testing across the agency and convince the rest of the agency’s security community that it was the right approach. Willing and enthusiastic support from the divisions’ security community was essential for the new testing program to work.

Download Government Department Gains Critical Insight Into Their Security Posture Whitepaper

federal-agency-gains-critical-insight-into

By submitting this form, you’re providing consent for ITTech News to use the information supplied as outlined in our privacy policy. This includes providing access to this download and sharing the information. Please check our privacy policy to see how we protect and manage your submitted data.

spot_img
spot_img
spot_img
spot_img

Newsletter

spot_img
spot_img
spot_img
spot_img
spot_img
spot_img

Don't miss

Harnessing practical automation programs to decouple cost from growth

Manual intensive operations processes are a key cost driver...

3 questions to set your active US SCG distribution strategy

To maximize your team’s selling efficiency, you need to...

5 ways to win RFPs

Asset owners frequently depend on formal RFPs for manager...

Exploring the Relationship of Interest Rates to Value vs Growth Investment Strategies

After the economic turmoil caused by the COVID-19 pandemic,...

How an Asian mobile network operator gained full visibility into the security posture of its 4G and 5G networks

Cyber threats are increasingly persistent, complex, and sophisticated. At the same time, the security regulations that communications service providers (CSP) must comply with are...

Harnessing practical automation programs to decouple cost from growth

Manual intensive operations processes are a key cost driver for communications service providers (CSPs). Capacity planning, fulfillment, assurance, and maintenance activities have improved somewhat...

3 questions to set your active US SCG distribution strategy

To maximize your team’s selling efficiency, you need to know who your best buyers are and how to price your product. Ask yourself these...