Navigating the Shift to Proactive Cybersecurity
Get a Demo of IBM Attack Surface Management Solution – Randori.
The adoption of cloud technology and the modernization of IT and networks have led to a substantial increase in overall exposure to cybersecurity risk. To address this matter, Persistent is hosting a special luncheon with IBM Cybersecurity experts to share insightful perspectives and discuss optimal strategies for handling cyber security exposure and managing attack surfaces.
We invite you to attend this special event and exchange ideas and share best practices on the most efficient approaches to mitigate cyber risks and protect against potential threats.
Additionally, you will be able to discover Randori, a cutting-edge IBM solution that effectively manages attack surfaces in real time.
52% of Security Leaders Say Red Teaming is the Best Practice for Risk Assessment & Reduction.
Join us to discuss how Persistent is collaborating with IBM to enable a unified platform for offensive security
Start understanding what attacker’s see and what they’d do with the only External Attack Surface Management (EASM) platform backed by real attackers.
Put the power of a nation-state behind your security team by giving them access to the leading offensive security experts.
Get the benefits of EASM and Continuous Automated Red Teaming (CART) in one agent-less, zero- friction SaaS Platform.
Build Resilience with Unified Offensive security
Chief Technology Officer, IBM Security, Asia Pacific, IBM Inc.
Chris is a Certified Information Systems Security Professional (CISSP), a Human Synergistic certified executive coach, and an IBM Master Inventor.
He has invented, designed, developed, installed, configured, supported, pitched, and sold cybersecurity products to global, APAC, and Australian markets for over 25 years.
Chief Architect, IBM Cloud and Security, Persistent System
Siddhu’s expertise in scalable architecture, design, and development, combined with a successful track record of deploying security solutions for enterprise customers, indicates a strong skill set and knowledge in the field. Building scalable architectures requires consideration of factors such as performance, reliability, and security. He has implemented security solutions for diverse enterprise customers worldwide for over 20 years.
Exclusive discussion on Proactive Cybersecurity
11:30 AM – 11:45 AM
11:45 AM – 12:00 PM
Introduction of Speakers
12:00 PM – 12:30 PM
Presentation by Siddu Bharamgonde
12:30 PM – 1:30 PM
1:30 PM – 2:00 PM
Demo by Chris Hockings
2:00 PM – 2:30 PM
News & Insights
Access our latest thought leadership and updates on Telecom & Media