ASMGi Presentations and Videos from ISS 2020

Whether you’re interested in protecting your company or providing better security for others, The SUMMIT is a mecca of cybersecurity information and innovation.

Cyber Security Sessions from ISS 2020

As part of ISS, ASMGi hosted series of Cyber Security presentations and panel discussions on Vulnerability Management, Third Party Risk, Managed Security Operations and DevSecOps along with cybersecurity experts from our partners at Prevalent, SafeBreach and Arctic Wolf.

You can view any of these VIDEO ON DEMAND sessions here and use the form below to access to the presentations.


DevSecOps Defined, Explained and Explored

Many organizations have been practicing DevOps for a period of time but have been challenged with the transition to DevSecOps and incorporation of Security into its Software Development Lifecycle model.  These sessions will cover how organizations can approach this challenge through a series of “discussions” covering three topic areas.

Is Your 3rd-Party Risk Program Ready for the Next Supply Chain Crisis? presented by ASMGi and  Prevalent

ASMGi and Prevalent discuss new techniques for getting ahead of supply chain risk and enabling proactive collaboration throughout the vendor lifecycle.

Operationalize the MITRE ATT&CK Framework using Breach Attack Simulation (BAS) presented by ASMGi and  SafeBreach

ASMGi and SafeBreach show how to leverage Breach Attack Simulation (BAS) to best enable security teams and how to operationalize the MITRE ATT&CK framework.

How MDR/MSOC covers the foundational elements of your security arsenal presented by ASMGi and Arctic Wold

ASMGi and Arctic Wolf discuss why so many companies are breached even when they seem too have all the right controls in place. You’ll learn actionable tips that enable you to best leverage the information already available to you to identify and stop attacks.

The evolving frontier of cyber security is becoming more important to understand and engage with to ensure the privacy, integrity and security of your data assets.

If you want to learn more about our Holistic Approach and any of these topics to cybersecurity email