CYBERUK

10 May 2022 - 11 May 2022

ICC Wales, Newport

The NCSC’s flagship event, CYBERUK 2022, will take place on 10-11 May 2022 at ICC Wales in Newport, South Wales. This year’s theme is ‘Cyber Security for the Whole of Society’ and will be delivered by the NCSC and sponsors across 4 distinct streams of activity :

  1. Resilience and tackling the threat
  2. Technology and the ecosystem
  3. Local to global leadership
  4. Interactive workshops

CYBERUK has become a key date in the calendar for thought-leaders in cyber security and technical professionals from the UK and around the world.

Held over two days, CYBERUK 2022 will be attended by more than 1,500 delegates, integrating cyber security leaders with technical professionals, strengthening the cyber security community. It will provide a key opportunity for the whole cyber security community to reconnect, discuss business needs and review the changing threat landscape.

 

Threat and Vulnerability Management Dashboard demonstration

Methods will have a stand at the event (A44) where Gareth Jones (CISO at Methods), is excited to demonstrate our Threat and Vulnerability Management Dashboard. Driven by Microsoft Defender APIs, our Power BI dashboard allows security administrators to drive efficiencies and customise their vulnerability management program. Security teams get detailed information from the following threat and vulnerability management areas:

• Vulnerabilities assessment – discovered vulnerabilities on devices
• Secure Configuration Assessment – detected misconfigurations on devices
• Software inventory – a full list of installed software products across devices

These dashboards also provide an easy way to report key information and trends to top management to track business KPIs and provide meaningful insights on the overall status of the vulnerability management program in your organisation.

Customised reports and dashboards enable you to pool the most meaningful data and insights about your organisation’s security posture into a more focused view based on what your organisation or specific teams and stakeholders need to know and care about most. They provide flexibility in using components such as vulnerability reports, missing security updates, installed software, end-of-support products, and operating systems for example, and combining them with advanced filtering capabilities. Methods can create custom reports for your organisation which can increase the actionability of information and improve efficiencies across teams, reducing the workload of busy security teams and allowing them to focus on the most critical vulnerabilities.

So come along and visit us at stand A44 for a demonstration of what Methods’ Threat and Vulnerability Management Dashboard can do for your organisation.

Attend event

You can apply to attend here.