Exclusive Content:

Choosing a Grants Management Software to Support Trust-Based Philanthropy

You care about running a trust-based grantmaking program. But...

MEASURING SOCIAL IMPACTA Guide for Grantmakers and CSR Professionals

As you work to advance social good, measurement is...

How to turn your app into a live streaming platform

Online live streaming is the single most engaging channel...

Federal Agency Gains Critical Insight Into Their Security Posture

CISO demands second opinion after internal reporting showed zero vulnerabilities

Security testing within a large US federal government agency was dispersed by department and performed by various teams. Pentesting was required, but each division operated somewhat independently and hired testers with various skill levels. Results were inconsistent and data from testing was trapped in written reports, not structured data. The CISO could not easily determine the quality of testing, remediation status, or the need for security improvements.

Pentest reports filed by several of the agency’s divisions consistently indicated no major vulnerabilities found. Yet, one of those divisions found itself in the headlines for a major cybersecurity breach.

The problem was that asset owners could block security testing. While the CISO was responsible for overseeing the testing process, only asset owners could grant access for safe testing. The CISO had to find a new way to perform penetration testing across the agency and convince the rest of the agency’s security community that it was the right approach. Willing and enthusiastic support from the divisions’ security community was essential for the new testing program to work.

Download Federal agency gains critical insight into their security posture Whitepaper

federal-agency-gains-critical-insight-into-their-security-posture-123
By submitting this form, you’re providing consent for CXO insiders News to use the information supplied as outlined in our privacy policy. This includes providing access to this download and sharing the information. Please check our privacy policy to see how we protect and manage your submitted data.

Newsletter

Don't miss

The path to experience driven commerce

Three milestones to better experiences. There is no more business...

What to Look for in a UCaaS Provider

When COVID-19 first struck, many organizations rushed to deploy...

Level up your ABM strategy

Account Based Marketing (ABM) is a B2B marketing strategy...

A comprehensive guide on B2B lead nurturing

Lead nurturing is structured to create a bond with...

Emerging tech sooths pandemic disrupted supply chains

Jaguar, Land Rover and Colgate-Palmolive are among the many...

Choosing a Grants Management Software to Support Trust-Based Philanthropy

You care about running a trust-based grantmaking program. But how can you put your values into action? This guide will show you what to...

MEASURING SOCIAL IMPACTA Guide for Grantmakers and CSR Professionals

As you work to advance social good, measurement is an essential component. Learn how to build a framework to track, understand, and analyze your...

How to turn your app into a live streaming platform

Online live streaming is the single most engaging channel for worldwide audiences. Live streaming helps people create a deeper connection with your brand. Authentic,...
Subscribe To Our Newsletter

Join our mailing list to receive the latest news and updates from our team.