Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Risk Management

Watch on Demand: Attack Surface Management Summit

In this virtual summit, SecurityWeek brings together expert defenders to share best practices around reducing attack surfaces in modern computing.

Attack Surface Management Summit

As security teams look to foundational strategies to protect corporate assets, the reduction of attack surface throughout the organization has taken center stage.

All sessions from SecurityWeek’s 2023 Attack Surface Management Summit are now available to watch on demand.

If you missed any sessions, you can watch them now in the virtual conference center:

  • Fireside Chat With Jason Chan, Former Netflix Security Chief
  • What Our 2022 Data Reveals About the Most Pressing Exposures on Your Attack Surface
  • You Can’t Protect What You Can’t See: Asset Intelligence as the Core of an Effective Attack Surface Management Strategy
  • Attack Surface Management: Why You Should be Going Further to Discover Exploitable risks
  • Why All Roads Lead Back to the Cloud – and Why It’s So Easily Compromised
  • Leadership Panel: Mitigating Risk While Attack Surfaces Expand
  • Technical Demos
  • Expo hall is still open!
Bishop Fox
Presenting Sponsor
Gold Sponsors

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Security Architecture

ChatGPT is increasingly integrated into cybersecurity products and services as the industry is testing its capabilities and limitations.

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Audits

Out of the 335 public recommendations on a comprehensive cybersecurity strategy made since 2010, 190 were not implemented by federal agencies as of December...