Contact Us
Talk to an Expert
Request a demo

Webinars

Thought leaders share their security and IT knowledge.

Get Real With Auditors and Your Team About Risk

Set-in-stone SLA tables for remediation based on standard, CVSS-based vulnerability evaluation: we know they look beautiful on your SOP and auditors love it, but that’s not the real world of cybersecurity. The reality is that vulnerabilities come up at a speed that is impossible to keep up with by any fixed schedule. What we need is a process nimble enough to adapt to the fluid exploit landscape and that relies on dynamic risk-based prioritization to cut through the noise.
Register Now

Upcoming Webinars

Webinars

Inverting the Vulnerability Management Pyramid

Traditional vulnerability-centric models leave you trying to narrow down the 30,000 “critical” vulnerabilities your scanner finds into a list short enough for your remediation team to manage. It’s time-consuming and inefficient. Register Now

WATCH NOW
Webinars

The Cloud Security Game Changer

Tune into Kenna Security’s webinar on Wednesday 14th October 2020, 10AM London to discuss how to gain new perspectives on how to evaluate cloud projects Register Now

WATCH NOW
Webinars

Get Real With Auditors and Your Team About Risk

Set-in-stone SLA tables for remediation based on standard, CVSS-based vulnerability evaluation: we know they look beautiful on your SOP and auditors love it, but that’s not the real world of cybersecurity. The reality is that vulnerabilities come up at a speed that is impossible to keep up with by any fixed schedule. What we need…

WATCH NOW

On Demand Webinars

Webinars

Attack Surfaces Are Increasing: What’s Your Game Plan?

Traditional network boundaries have long since disappeared. Organizations today must protect an array of ephemeral and distributed assets, on-premise and in the cloud, across their core networks and those of trusted partners and suppliers. The challenge of monitoring this distributed attack surface has only increased with the surge in remote work due to the coronavirus…

WATCH NOW
Webinars

Envisioning a Different Future for Vulnerability Management

What if you knew that, in any given week, only 40 known vulnerabilities posed a real risk to your IT environment? How would that knowledge change the way you manage vulnerabilities? How much time could your Security and IT teams reclaim for other, more strategic projects? Traditional vulnerability-centric models leave you trying to narrow down…

WATCH NOW
Webinars

Unlock The Next Level of VM: Modern Vulnerability Management

We’ve all heard by now that industry analysts have put their official stamp of approval on risk-based vulnerability management (RBVM), verifying what many companies already know: vulnerability management needs data-based prioritization to be impactful and lower your risk. But what happens when you apply RBVM to drive real change in your organization? What can you…

WATCH NOW
Webinars

The New Normal: What’s Changed for Security & Vulnerability Management

The rise of COVID-19 has disrupted day-to-day business operations, forcing companies to change quickly. As security teams establish a new normal, we assess what has – and hasn’t – changed about the threat landscape. In addition to the challenges that remote working brings to cybersecurity, there are other urgent questions:  How will vulnerability management practices…

WATCH NOW
Webinars

Successful Application Security Strategies

As enterprises deepen their investment in public cloud and digital transformation, the rate of sensitive data flowing through their organizations continues to accelerate. This has left application security teams with many visibility and process challenges. Join industry veterans and application security experts Jonathan Cran, Head of Research at Kenna Security, and Tyler Shields, Vice President…

WATCH NOW
Webinars

The Road to Launching Risk-Based SLAs 

In the realm of vulnerability management, SLAs are too often defined by guesswork, and that leaves teams struggling to meet them. So when one of the nation’s largest financial institutions asked for customized research to shape their SLAs, we had an epiphany. We realized we could help people define better SLAs—with our pre-existing data and benchmark…

WATCH NOW
FacebookLinkedInTwitterYouTube

© 2020 Kenna Security. All Rights Reserved. Privacy Policy.