YouTube Videos
Pentesting and Vulnerability Management: Session Three – Mastering Threat Monitoring
Ongoing proactive management of your environment – how to use and sell vulnerability management So, you've done your pen test(s) and started the fixes, how do you monitor new threats and track your progress against the pen test recommendations.
Cross-Mapping: The Truth About Frameworks and Privacy
Discover the truth about cross-mapping frameworks and privacy in this insightful video. Learn why cross-mapping is not as straightforward as it seems and how Compliance Scorecard approaches it differently. Find out how to address CMMC requirements and explore the relationship between NIST catalog and control...