How to Implement Attack Surface Management in the AI and Cloud Age

Register Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Emanating from a military concept, cybersecurity attack surface management (ASM) has become an important strategy for combatting increasingly sophisticated, targeted and complex attacks.

ASM has evolved significantly in recent years, from a siloed approach that visualizes exposed assets of organizations to interconnected platforms, monitoring a wide range of internal and external cyber risks. ASM solutions have also become more accessible for smaller organizations that have only a limited cybersecurity department.

In this webinar, a panel of experts will examine the latest attack surface trends and discuss the future of ASM. This includes attackers’ targeting of the cloud and use of malicious AI tools, and how ASM strategies need to evolve in the face of these new threats.

The use of AI and automation will be essential to rapidly discover surging vulnerabilities and other attack techniques, while real-time threat intelligence can further transform ASM.

Join this webinar to learn:

  • The origins of ASM and its breakthrough into mainstream cybersecurity
  • How attackers are targeting the expanded attack surface, including the cloud
  • The new features tools and integrations necessary to enhancing ASM solutions against modern threats
  • What the future holds for ASM

Speakers

Photo of Victor Acin

Victor Acin

Director, Product Management, Outpost24

Photo of Mary Carmichael

Mary Carmichael

Director, Risk Advisory, Momentum Technology and Emerging Trends Working Group Member, ISACA

Photo of James Coker

James Coker

Deputy Editor, Infosecurity Magazine

Photo of Martin Jartelius

Martin Jartelius

CISO & Product Director, AI, Outpost24

Photo of Phil Robinson

Phil Robinson

principal security consultant and founder, Prism Infosec

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for Outpost24 here: https://outpost24.com/legal/website-terms-of-use. Please see Infosecurity Magazine’s privacy policy for more information.