ON-DEMAND TRAINING:  
Build your risk-based vulnerability program
Contact Us
Talk to an Expert
Request a demo

Webinars

Thought leaders share their security and IT knowledge.

7 Questions Every CISO Should Ask Vulnerability Management Vendors

Sifting out marketing claims from actual facts is often the most difficult part of evaluating vulnerability management (VM) solutions—particularly when it comes to assessing vuln prioritization. When every vendor promises their vuln prioritization is “industry leading” or “most advanced,” how can you possibly stack them up.
Register Now

Upcoming Webinars

Webinars

7 Questions Every CISO Should Ask Vulnerability Management Vendors

Sifting out marketing claims from actual facts is often the most difficult part of evaluating vulnerability management (VM) solutions—particularly when it comes to assessing vuln prioritization. When every vendor promises their vuln prioritization is “industry leading” or “most advanced,” how can you possibly stack up Brand X against Brand Y? In this powerful introduction to…

REGISTER NOW

On Demand Webinars

Webinars

From Idea to Implementation: The Risk-Based Vulnerability Management Rollout

The journey to risk-based vulnerability management doesn’t always look the same for each organization. It’s a fundamental transformation in thinking and working—and one that pays dividends. But regardless of industry, company size, or team makeup, most organizations face common challenges that will look familiar to virtually anyone in cybersecurity. Luckily, we can help you overcome…

WATCH NOW
Webinars

3 Ps of Customer Experience: Prescriptive, Partnership, and Project Management

Something as pivotal as risk-based vulnerability management demands more than just a great solution and a one-and-done user training during the customer onboarding phase. It demands in-depth education and a fundamental shift in thinking to align the team and the company around a risk-based mindset. To transform vulnerability management and ultimately lower risk, customers need…

WATCH NOW
Webinars

Vulnerability Prioritization: Bridging the Gap Between Security and IT

Too many Security and IT teams know the challenge of establishing an efficient and effective remediation workflow. Mired by murky direction, unsupported priorities, and an insurmountable number of vulnerabilities to tackle, friction can develop between these teams that ultimately hinders security efficacy.  As companies transform their operations and secure their modern cloud workloads, this challenge…

WATCH NOW
Webinars

10-Year Cybersecurity Wrap-up and 2021 Trends to Watch

As one of the most disruptive years we’ve seen in many of our lifetimes comes to a close, it’s a good time to pause and look back—and also forward. The global pandemic, of course, dominates the current conversation, but events of the last decade and their overall impact on cybersecurity can reveal greater insight into…

WATCH NOW
Webinars

Prioritization to Prediction: Building a Risk-based Vulnerability Management Program

Organizations are overwhelmed by the total number of vulnerabilities. With limited resources, how do you prioritize the most critical vulnerabilities for remediation? In this webcast, Paul Asadoorian and Matt Alderman from Security Weekly will discuss the challenges of vulnerability prioritization. Next, Ed Bellis, Founder and Chief Technology Officer at Kenna Security, will provide an overview…

WATCH NOW
Webinars

The Life and Times of a Vulnerability and What It Means For You

Vulnerability management is all about time.  How long does it take to find, prioritize and remediate vulnerabilities?  How long until our adversaries discover and exploit these weaknesses?  Who owns the momentum between defenders and attackers and what influences that dynamic?  The sixth volume of the Prioritization to Prediction series produced in partnership with the Cyentia…

WATCH NOW
FacebookLinkedInTwitterYouTube

© 2021 Kenna Security. All Rights Reserved. Privacy Policy.