Advertising chief shares rationale behind a brand new brand method that reflects evolved business choices.
Contribute to FORBES: http://www.youtube.com/forbes
Take a look at our full video clip catalog: http://www.youtube.com/user/forbes/videos
For more FORBES content: http://forbes.com
Follow FORBES on Twitter: http://twitter.com/forbes
Like FORBES on Facebook: http://fb.com/forbes
Follow FORBES on Instagram: http://instagram.com/forbes
TransUnion CISO Jasper Ossentjuk feels that with the enhanced rate of automatic and targeted assaults, InfoSec groups need work smarter—not harder.
That means the old ways of vulnerability management—scanning, after that manually parsing through outcomes using pivot tables—no longer work. Which is especially true when Jasper needs to report their corporation’s general threat exposure to the board; their non-technical colleagues require reporting which is metric-based and artistic, perhaps not arcane spreadsheets.
Within webinar, discover how Jasper along with his group computerized key the different parts of vulnerability administration while going to a risk-based view that significantly conserved time, improved staff effectiveness, and equipped Jasper with high-level reporting that enabled him to talk about their staff’s results with his executive colleagues.
Jasper’s co-presenter is Ed Bellis, CTO and co-founder of Kenna Security (and former CISO at Orbitz).
Movie Rating: / 5