The NCSC’s flagship event, CYBERUK 2022, will take place on 10-11 May 2022 at ICC Wales in Newport, South Wales. This year’s theme is ‘Cyber Security for the Whole of Society’ and will be delivered by the NCSC and sponsors across 4 distinct streams of activity :
- Resilience and tackling the threat
- Technology and the ecosystem
- Local to global leadership
- Interactive workshops
CYBERUK has become a key date in the calendar for thought-leaders in cyber security and technical professionals from the UK and around the world.
Methods is attending the event and will be at stand A44 where we are excited to demonstrate the Microsoft Threat and Vulnerability Management Dashboard. Driven by Microsoft Defender APIs, the Power BI dashboard allows security administrators to drive efficiencies and customise their vulnerability management program. Security teams get detailed information from various threat and vulnerability management areas:
- Vulnerabilities assessment – discovered vulnerabilities on devices
- Secure Configuration Assessment – detected misconfigurations on devices
- Software inventory – a full list of installed software products across devices
These dashboards also provide an easy way to report key information and trends to top management to track business KPIs and provide meaningful insights on the overall status of the vulnerability management program in your organisation.
Customised reports and dashboards enable you to pool the most meaningful data and insights about your organisation’s security posture into a more focused view based on what your organisation or specific teams and stakeholders need to know and care about most. They provide flexibility in using components such as vulnerability reports, missing security updates, installed software, end-of-support products, and operating systems for example, and combining them with advanced filtering capabilities. Building on these dashboards, Methods can customise reports for your organisation which will increase the actionability of information and improve efficiencies across teams, reducing the workload of busy security teams and allowing them to focus on the most critical vulnerabilities.
We will also be showcasing how using IriusRisk threat modelling capabilities is a simple way to proactively uncover threats that are not typically discovered through code reviews or other types of audits. With the ever changing current threat landscape, security must be built into software and systems to prevent organisations coming under attack.
Come and visit us at stand A44 for a demonstration of what the Microsoft Power BI Threat and Vulnerability Management Dashboard can do for your organisation and how Methods can help you customise reports and productionise the dataflows and dashboards in your cloud environment.