NEW Research: The Attacker-Defender Divide  
Download now >
Contact Us
Talk to an Expert
Request a demo

Webinars

Thought leaders share their security and IT knowledge.

The Life and Times of a Vulnerability and What It Means For You

The sixth volume of the Prioritization to Prediction series produced in partnership with the Cyentia Institute, we look at the lifecycle of vulnerabilities.
Watch Now

Upcoming Webinars

Webinars

Prioritization to Prediction: Building a Risk-based Vulnerability Management Program

Webinar: Wednesday, December 2, 2020, 12:00 p.m. PT / 3:00p.m. ET Organizations are overwhelmed by the total number of vulnerabilities. With limited resources, how do you prioritize the most critical vulnerabilities for remediation? In this webcast, Paul Asadoorian and Matt Alderman from Security Weekly will discuss the challenges of vulnerability prioritization. Next, Ed Bellis, Founder and Chief…

REGISTER NOW

On Demand Webinars

Webinars

The Life and Times of a Vulnerability and What It Means For You

Vulnerability management is all about time.  How long does it take to find, prioritize and remediate vulnerabilities?  How long until our adversaries discover and exploit these weaknesses?  Who owns the momentum between defenders and attackers and what influences that dynamic?  The sixth volume of the Prioritization to Prediction series produced in partnership with the Cyentia…

WATCH NOW
Webinars

Boost Web Vulnerability Management with Prioritization and Visibility

Maximize Your Web Security Manual processes and standalone tools are no longer enough to build and maintain a consistent security program. When you add the growing cybersecurity skills gap into the picture, it is clear that security partnerships are now vitally important. In this webinar, you will learn how to optimize web vulnerability management with…

WATCH NOW
Webinars

The Cloud Security Game Changer

Tune into Kenna Security’s webinar on Wednesday 14th October 2020, 10AM London to discuss how to gain new perspectives on how to evaluate cloud projects Register Now

WATCH NOW
Webinars

Get Real With Auditors and Your Team About Risk

Set-in-stone SLA tables for remediation based on standard, CVSS-based vulnerability evaluation: we know they look beautiful on your SOP and auditors love it, but that’s not the real world of cybersecurity. The reality is that vulnerabilities come up at a speed that is impossible to keep up with by any fixed schedule. What we need…

WATCH NOW
Webinars

Attack Surfaces Are Increasing: What’s Your Game Plan?

Traditional network boundaries have long since disappeared. Organizations today must protect an array of ephemeral and distributed assets, on-premise and in the cloud, across their core networks and those of trusted partners and suppliers. The challenge of monitoring this distributed attack surface has only increased with the surge in remote work due to the coronavirus…

WATCH NOW
Webinars

Envisioning a Different Future for Vulnerability Management

What if you knew that, in any given week, only 40 known vulnerabilities posed a real risk to your IT environment? How would that knowledge change the way you manage vulnerabilities? How much time could your Security and IT teams reclaim for other, more strategic projects? Traditional vulnerability-centric models leave you trying to narrow down…

WATCH NOW
FacebookLinkedInTwitterYouTube

© 2020 Kenna Security. All Rights Reserved. Privacy Policy.