Get a demo
CRS logo white

Tailored for
cybersec teams
by cybersec leaders

Live session | November 20 | 11:00 – 1:00pm EST

100% free & live

* All registrants get access to on-demand recordings.

Learn how cyber experts are tackling exposure risk and doing vulnerability management better:

  • Harness GenAI for CVE enrichment and other vulnerability management dirty jobs, apply exposure management best practices in financial services, align the humans with your cyber defense objectives, and gain precise visibility into your asset security.

  • Seven sessions packed into two hours covering all aspects of exposure risk management.

  • Connect with a global community of industry leaders and security professionals like yourself.

  • Get access to free tools, exposure assessment resources, and the CPE credits you need before the end of the year.

featuring industry experts:

Yahoo
Quadrant
Boltech
IBM

Secure your spot

Connect with a global community of cybersecurity leaders and gain exclusive insights at the biggest exposure risk management event of the year.

Agenda

11:00 AM – 11:20 AM

With over 100 Common Vulnerabilities and Exposures (CVEs) published daily, manual vulnerability analysis and enrichment have become increasingly challenging.

This presentation demonstrates how Generative AI can streamline the CVE enrichment process by:

  • Assigning and validating Common Weakness Enumeration (CWE) categories
  • Extracting key phrases from CVE descriptions
  • Determining MITRE Technical Impact based on extracted key phrases

Learn how to harness GenAI to enhance your vulnerability management workflow, improving accuracy and efficiency in CVE analysis.

Asset 37

Chris Madden
Distinguished Technical Security Engineer at Yahoo

11:20 AM – 11:40 AM

In today’s sprawling digital landscape, managing assets and vulnerabilities can feel like playing an endless game of hide and seek—except in this game, your assets are multiplying, and the vulnerabilities are getting better at hiding. In just 15 minutes, we’ll dive into the chaotic reality of asset management and why your vulnerabilities are slipping through the cracks. You’ll learn how to stop being reactive and start being proactive, gaining better visibility into what you own, what’s at risk, and how to get ahead of the threats.

 

We’ll cover why treating asset management as a side job is a recipe for disaster, how unmanaged assets become the perfect breeding ground for vulnerabilities, and, most importantly, how to regain control of the madness. Whether you’re dealing with rogue IoT devices, forgotten virtual machines, or sprawling cloud environments, this talk will arm you with strategies to stop playing catch-up and start winning the game.

 

Expect some unpopular opinion—but you’ll leave with actionable insights to take back control of your assets and squash vulnerabilities before they become a bigger problem.

Josh-C-circle

Josh Copeland
Director of Managed Security Services at Quadrant Information Security

11:40 AM – 11:45 AM

Exposure MatuRate

Gal-circle

Gal Gonen
Director of Marketing at Vulcan Cyber

11:45 AM – 12:00 PM

As a tech-driven company committed to modernizing security posture, we’ve found that Vulcan has transformed our vulnerability management—streamlining processes, minimizing manual data handling, and enhancing transparency with stakeholders. I’ll share how it’s refined our workflow and strengthened our collaboration with stakeholders.

Gabriela P

Gabriela Pantelimon
SecOps Engineer at

bolttech

12:00 PM – 12:15 PM

Dive into exposure management practices that will elevate your security program, including leveraging threat data, adhering to SEC guidance, understanding actual breach costs, and implementing proactive incident response

Asset 38

Jay Mandeville
Former VP Governance Risk and Compliance at Wells Fargo

12:15 PM – 12:30 PM

Human factors is the discipline of psychology, engineering, and design that works to improve the tools that we use. Integrating this well known discipline in cybersecurity can help get to the root of burnout, challenging security measures, and more.

Nikki-Robinson

Dr. Nikki Robinson

STSM and Senior Manager, Threat Platform Application Development at IBM

12:30 PM – 12:45 PM

Exploring ExposureOS

Tal-Marom

Tal Marom
VP of Product at 
Vuclan Cyber

12:45 PM – 1:00 PM

What we learned from 300+ vulnerability managers in 2024?

Hadar-L

Hadar Landau
Product Marketing Manager at Vulcan Cyber

The CyberRisk Summit in numbers

Asset 17

The 9th consecutive summit

The CyberRisk Summit is the Vulcan Cyber bi-annual event, happening for the 9th time on December  

Asset 18

Over 10,000 security professionals

Have been participating in the 8 previous summits.

Asset 19

30+ sponsors

Engage with security leaders like yourself from various industries worldwide

Past CyberRisk Summit sponsors of 2024

Vulcan logo white
YL
LLM agent exploitation
Wealthsimple_1

Watch the May 2024 CRS, on-demand

See exposure risk in a whole new light as we gather cyber luminaries to help you.

  • Challenge the vulnerability management status quo
  • Tackle DORA and NIS2 compliance
  • Learn how Origami Risk mitigates exposure risk
  • And much more.