Build your risk-based vulnerability program
Contact Us
Talk to an Expert
Request a demo

Now Playing: Insights On Demand from Kenna Katalyst

Jan 19, 2021
Ed Bellis
Chief Technology Officer, Co-founder

Share with Your Network

Experts have an urgent message for CISOs and IT execs: Focusing your vulnerability management efforts around risk will be a top priority for 2020-2021. They’ve been saying that for a while, but the need to adopt a risk-based vulnerability management (RBVM) program, informed by real-world intelligence and powered by data science, is becoming more acute as vulnerabilities and exploits targeting them mount.

As critical as this idea is, I’ve no doubt it’s a daunting prospect for organizations still relying on CVSS scores and spreadsheets to manage vulns. How do you understand what’s happening in the market now? And where do you get the expertise to deploy an effective RBVM program that helps Security and IT work efficiently to drive down risk?

And if you don’t already have that expertise in house, where can you find it?

Kenna Katalyst: The on-demand educational series for RBVM

Well, you can find it here: Kenna Katalyst, the on-demand educational series now available online from Kenna Security and The Cyentia Institute. 

The Kenna Katalyst Educational Series is a first-of-its-kind, CPE accredited tutorial on how to prioritize and target your organization’s riskiest vulnerabilities. It features real-world data and state-of-the art RBVM best practices.

The Kenna Katalyst series opens with Cyentia Partner and Co-founder Wade Baker covering insights from the series of  research on where vulnerabilities are found (and why 80% aren’t likely to pose much of a risk to your organization). Wade then turns it over to me, where I’ll walk you through the steps every organization should take to establish an RBVM program that:

  • Reduces your overall risk
  • Optimizes your resources 
  • Simplifies remediation for IT and DevOps 
  • Aligns everyone, from board members to operations teams, around easily understood risk metrics
  • Maximizes your coverage and efficiency on cybersecurity investments

Give us an hour, get so much in return

To reduce your online fatigue, we took our Kenna Katalyst in-person half day sessions and condensed them down to less than an hour into a series of short, easily consumed videos annotated with key findings and supplemental materials. Wade and I will explore insights gleaned from surveys of enterprises in multiple industries, and from actual vulnerability management activity covering millions of IT assets. 

Not only does the Kenna Katalyst series provide a clear look at the challenges that vulnerability management poses today, but it offers a just-as-clear roadmap for overcoming them. You’ll learn about the importance of real-time, real-world information when assessing whether a specific threat poses a risk to your environment; the need for SLAs that reflect not just how risky a vuln is to you, but also your organization’s tolerance for risk; and the tools you should have in your arsenal to anticipate and prevent the next exploit.

And with the on-demand format of Kenna Katalyst, you can now engage with it whenever you have a few minutes and come back to it when you’re ready for more. 

Along with actionable real-world benefits insights, participants who complete the workshop will also receive one CPE credit upon completion. Backed by our partners at (ISC)², Kenna Katalyst provides valuable training for your continued education. 

Kenna Katalyst is the perfect resource to share with colleagues at any level of security or IT expertise, and is so easily consumed they might even find it a welcome escape from their daily routine in this locked-down age. (We expect a few folks will even use it as an excuse to steal away for some quiet time when family holiday gatherings get a little too overwhelming. Not your family, of course, but someone else’s.)

Register in seconds, get rolling immediately

Simply register by entering your email and you’ll gain immediate access to every chapter in this on-demand series. It’s that easy.

Assuming Gartner, Forrester and other industry analyst firms are correct, you’ll want to learn more about RBVM as soon as possible. Now is the time to do it, and Kenna Katalyst is a great place to start.

Share with Your Network

Read the Latest Content

Risk-Based Vulnerability Management

Analysts Agree: Risk-Based Vulnerability Management a Priority for 2021

Taking a risk-based approach to vulnerability management has always been our priority, and lately the industry has followed suit. Now in a new blog listing Gartner’s Top 10 Security Projects for 2020-2021, it’s clear that Gartner thinks it should be a priority for you, too. For a sense of why RBVM is a top priority…

Vulnerability Management

11 Tips for Choosing a Vulnerability Management Solution

“These tips go to 11.” – Nigel Tufnel It can be daunting to choose between vulnerability management (VM) solutions when all vendors describe their offerings in very similar ways. So making the best choice for you means identifying what your organization needs, and ensuring the solutions you’re evaluating meet those needs. It’s safe to say…

Risk-Based Vulnerability Management

What is Modern Vulnerability Management?

Modern vulnerability management is an orderly, systematic, and data-driven approach to enterprise vulnerability management. It leverages full visibility into a technology stack to target the riskiest vulnerabilities, enabling companies to adhere to designated SLA’s, respond to threats rapidly, and have meaningful discussions about organizational risk tolerance. Got that? Let’s unpack it.  To understand what modern…


© 2021 Kenna Security. All Rights Reserved. Privacy Policy.