Cyber Threats, Cyber Vulnerabilities: Assessing Your Attack Surface

A full-day virtual event that outlines methods for assessing your organization’s cybersecurity vulnerabilities, the threat from potential attackers, and your overall cyber risk

Every enterprise today knows that cyber attacks pose a significant threat to their business. But do you know exactly how much risk you face? Do you know where your greatest vulnerabilities are? Do you know which attacks are most likely to be used against an organization like yours, and which attackers are most likely to target you?

These are just some of the questions that will be explored and answered at Dark Reading’s next virtual event, Cyber Threats, Cyber Vulnerabilities: Assessing Your Attack Surface. This new virtual event -- a free, all-day online conference produced by the editors of Dark Reading -- offers insight, advice, and best practices on how to assess your organization’s “attack surface” – the parts that are most vulnerable to cybercriminals – and the risk you face in todays’ cyber threat environment. You’ll get a look at the various methods for finding and fixing cyber vulnerabilities in your organization, as well as an overview of some of the latest exploits and methods used by today’s cybercriminals. Top security experts and researchers will discuss the various ways that current threat actors might use to penetrate your defenses, and how you can identify IT conditions that might make your data vulnerable to those attacks. Best of all, you’ll get advice and recommendations on how to assess your organization’s overall cyber risk, and what you can do to reduce it.


On Demand
6h 30min

Among the topics that will be covered at Cyber Threats, Cyber Vulnerabilities: Assessing Your Attack Surface:

  • An overview of the most common security vulnerabilities in enterprise systems, and how attackers exploit them
  • Key methods for finding and fixing cyber vulnerabilities, including vulnerability scanning, penetration testing, and red teaming
  • Details on the latest attack trends and the threat actors who launch them
  • Methods for collecting threat intelligence and using it to customize your cyber defense
  • Best practices for assessing your organization’s “attack surface” and the likelihood of a crippling exploit
  • Tools and practices for measuring cyber risk and reporting it to upper management
  • Steps your organization can take today to reduce cyber risk tomorrow

If you want to know more about the ways that cybercriminals might penetrate your online defenses – and how to measure the specific risks faced by your organization -- then this virtual event is for you. Register today!