Dan heads up Security Operations at Quilter, overseeing all aspects of security operations including security breach attack simulation, security incident and vulnerability management for all areas of the Quilter group. Dan has over 20 years’ experience of leading Security, IT and IT Risk Management & Operational Resilience functions for multiple sectors including financial services, healthcare and retail.
I would like to focus this blog on how Continuous Security Validation technology can help improve and build collaborative relationships within risk management functions when focusing on security. I have operated in both a first (running security, IT, and operational resilience controls) and second-line (overseeing security) capacity, with much of this spent in a heavily audited environment, along with our rather steadfast friends in the third line (completing the trio of the three lines of.
In this blog, I wanted to provide my view on penetration testing versus vulnerability management and how Continuous Security Validation can complement your armory. The Pen isn’t Mightier Penetration tests are often expensive point-in-time assessments, either driven by an annual cycle or by a project-related change e.g. your organization’s latest website, app, or acquisition. Depending on the size of the penetration test, the testers are often working on fixed scopes and tight deadlines,.
Read More >
Subscribe to Our Blog
Stay up to date with the latest cybersecurity news and tips