February 26th

Live Tutorial: Why cybersecurity risk assessments must start with strong requirements

In this small-group live tutorial, we'll demonstrate how you can automatically check your requirements specifications for quality, consistency, and testability – all while learning cybersecurity best practices that you and your team can immediately start applying.

QRA Team

Kristin Ross

Event Details:

When: February 26th

Where: Live Webinar

Time: 12pm EST

54% of cybersecurity professionals reported at least one security incident involving an industrial control system in a span of 12 months (The State of Industrial Cybersecurity 2017).

Yet having an efficient process in place to comply with regulatory and industry requirements has been shown to immensely improve cybersecurity success, with 74% of US respondents stating that adherence to compliance requirements was either “very” effective or “extremely” effective (2018 Global Threat Report).

So how can organizations start improving their cybersecurity processes immediately? First and foremost, by starting with actionable and robust requirements related to non-adversarial threat sources such as suppliers, other departments, and even your internal team.

In this small-group live tutorial, we’ll demonstrate how you can automatically check your requirements specifications for quality, consistency, and testability – all while learning cybersecurity best practices that you and your team can immediately start applying.

Reserve Your Spot

Registration for this cyber security live tutorial is free. You’ll receive an invitation in your inbox immediately. The tutorial will begin at 12:00pm EST, Tuesday the 26th.



Share this Event