On-Demand Webinar
Navigating the Latest IT Security Guidelines for Hong Kong Enterprises
- Active Directory
- Cloud
- IT/OT
- Risk-based Vulnerability Management
- Vulnerability Management
- Web Application Scanning
- Tenable Cloud Security
- Tenable Vulnerability Management
Practical Guidelines for Hong Kong Based Enterprise Companies
Aligning to the latest IT Security Guidelines (G3)
The nature and scope of cyber threats is anything but static. More than 29,000 CVEs were published in the past year, of which thousands were assigned with high severity scores that would require immediate remediation. How do you prioritize which vulnerabilities to fix first?
In this technology showcase, we will cover how the cybersecurity practices have evolved from traditional vulnerability assessment to a Continuous Threat Exposure Management (CTEM) program, and offer practical advice on how HK-based enterprises can align to the latest IT Security Guidelines (G3) - released in April 2024.
Benefits of a consolidated unified platform approach include:
- Centralized view of all assets (IT, OT, web assets, cloud assets, active directory and more)
- CVE/CVSS/CVR risk-based criticality scores explained
- Different scanner method
- Recommended remediation actions
- Keeping track of vulnerability status
This session is conducted in Cantonese and recommended for IT Security professionals working for enterprises and government agencies in Hong Kong.