{"id":334,"date":"2024-03-12T05:03:20","date_gmt":"2024-03-12T05:03:20","guid":{"rendered":"https:\/\/cyberwissen.io\/pt\/solution\/penetration-testing-copy\/"},"modified":"2024-03-25T07:24:48","modified_gmt":"2024-03-25T07:24:48","slug":"managed-risk","status":"publish","type":"solution","link":"https:\/\/cyberwissen.io\/pt\/solution\/managed-risk\/","title":{"rendered":"Managed Risk"},"content":{"rendered":"<section id=\"\" class=\"\">\n<div class=\"vGap15\"><\/div>\n<div class=\"container\">\n<div class=\"row\">\n<div class=\"col-lg-8 col-xs-12  text-left\">\n<h4 class=\"primary uppercase\"> HOW IT\u00a0WORKS<\/h4>\n<h3 class=\"  \">The CyberWissen Managed Risk Process <\/h3>\n<p class=\"xl\">\n<\/div><\/div>\n<div class=\"vGap25\"><\/div>\n<div class=\"row \">\n<div class=\"col-lg-4 col-xs-12 \">\n<div class=\"howItWorksTile \">\n<div class=\"content\">\n          <img data-opt-id=1692512429  fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/048-encryption-blue.svg\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4 class=\"capitalcase\">Deployment<\/h4>\n<p><p>Our team will work with you to deploy the CyberWissen Platform, integrate critical data points, and build an understanding of your network.<\/p>\n<p>\n<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-lg-4 col-xs-12 \">\n<div class=\"howItWorksTile \">\n<div class=\"content\">\n          <img data-opt-id=1212212410  fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/042-optimization-blue.svg\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4 class=\"capitalcase\">Configuration<\/h4>\n<p><p>Gain clear understanding and visibility into your attack surface by establishing asset context and a vulnerability baseline.<\/p>\n<p>\n<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-lg-4 col-xs-12 \">\n<div class=\"howItWorksTile \">\n<div class=\"content\">\n          <img data-opt-id=1838171779  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/040-remote-access-blue.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4 class=\"capitalcase\">Active Cycle<\/h4>\n<p><p>The Active Vulnerability Management Cycle phase is a steady state and continuous cycle aimed at providing proper coverage, prioritizing risks, hardening of your environment, and ensuring mitigation efforts are successful.<\/p>\n<p>\n<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"vGap15\"><\/div>\n<\/div>\n<\/section>\n<section class=\"\">\n<div class=\"vGap15\"><\/div>\n<div class=\"container\">\n<div class=\"row justify-content-left\">\n<div class=\"col-lg-8 col-xs-12 text-left\">\n<div class=\"vGap25\"><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"row\">\n<div class=\"col-lg-12 col-xs-12\">\n      <\/div>\n<\/p><\/div>\n<div class=\"vGap25\"><\/div>\n<div class=\"row\">\n<div class=\"col-lg-12 col-xs-12 text-center\">\n      <img data-opt-id=360821727  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/infograph_3.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" style=\"width:100% !important; margin:0 auto;\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap15\"><\/div>\n<\/div><\/div>\n<\/div>\n<\/section>\n<section class=\"\">\n<div class=\"vGap50\"><\/div>\n<div class=\"container\">\n<div class=\"row justify-content-end\">\n<div class=\"col-lg-4 col-xs-12 text-left\">\n<h2 class=\"orange bold\">Digital Risk by the\u2028Numbers<\/h2>\n<p class=\"xl\">The growing attack surface compounds cyber risks for organization of new digital initiatives, the adoption of the Internet of Things (IoT), and the continued move to the cloud help drive innovation &#8211; but at the cost of increased exposure to threats. Risk management solutions are becoming the norm to combat the issue.<\/p>\n<div class=\"vGap25\"><\/div>\n<div class=\"vGap15\"><\/div>\n<\/div>\n<div class=\" col-lg-7  col-xs-12 offset-lg-1 text-left\">\n<div class=\"row\">\n<div class=\"col-lg-4 col-xs-6  text-left\">\n<div class=\"vGap25\"><\/div>\n<h1><span class=\"statCounter\">40<\/span>% <\/h1>\n<p>of mid-size enterprises have a formal vulnerability management program in place.<\/p>\n<\/p><\/div>\n<div class=\"col-lg-4 col-xs-6  text-left\">\n<div class=\"vGap25\"><\/div>\n<h1><span class=\"statCounter\">60<\/span>% <\/h1>\n<p>of IT risk management roles predicted to become dependent on risk management solutions to aggregate digital risks in their business ecosystems by 2025.<\/p>\n<\/p><\/div>\n<div class=\"col-lg-4 col-xs-6  text-left\">\n<div class=\"vGap25\"><\/div>\n<h1><span class=\"statCounter\">80<\/span>% <\/h1>\n<p>Implementing the Center for Internet Security\u2019s (CIS) top five critical security controls can prevent 80% of the most common cyber attacks<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<p class=\"specialnote\">CyberWissen Security Operations Report, 2022<br \/>\n2023 Ponemon Survey Report: Staffing the IT Security Function in the Age of Automation Osterman Research<\/p>\n<\/div><\/div>\n<\/div>\n<div class=\"vGap15\"><\/div>\n<\/section>\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<section class=\"\">\n<div class=\"vGap15\"><\/div>\n<div class=\"container\">\n<div class=\"row align-items-start\">\n<div class=\"col-lg-5 col-xs-12 text-left\">\n<h4 class=\"blue\">CYBER-LED\u00a0MANAGED RISK EXPERIENCE<\/h4>\n<h2>Managed Prioritization and Personalized Protection Delivered by Your Cyber Security  Team<\/h2>\n<div class=\"vGap10\"><\/div>\n<p>The Cyber Security Team is a force multiplier to your existing security team. If you don\u2019t have a security team, you gain instant access to security professionals that are otherwise difficult, if not impossible to find.<\/p>\n<p>Your named Cyber Security engineer works with you to prioritize vulnerabilities discovered from networks, endpoints, and cloud environments.<\/p>\n<\/div>\n<div class=\"col-lg-6 col-xs-12 offset-lg-1 text-left\">\n<div class=\"tabsContainer\">\n<ul class=\"nav nav-tabs custom_tabs\" id=\"myTab\" role=\"tablist\">\n<li role=\"presentation\">\n    <a  id=\"tab_1\" data-bs-toggle=\"tab\" data-bs-target=\"#tab_content_1\" type=\"button\" role=\"tab\" aria-controls=\"home\" aria-selected=\"true\" class=\"active\"><img data-opt-id=1997782134  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/icon_monitoring5_blue.svg\"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" class=\"optimole-lazy-only  icon\"\/><br \/>Discover    <\/a>\n  <\/li>\n<li role=\"presentation\">\n    <a  id=\"tab_2\" data-bs-toggle=\"tab\" data-bs-target=\"#tab_content_2\" type=\"button\" role=\"tab\" aria-controls=\"home\" aria-selected=\"true\"><img data-opt-id=979514463  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/icon_remediation_blue.svg\"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" class=\"optimole-lazy-only  icon\"\/><br \/>Assess    <\/a>\n  <\/li>\n<li role=\"presentation\">\n    <a  id=\"tab_3\" data-bs-toggle=\"tab\" data-bs-target=\"#tab_content_3\" type=\"button\" role=\"tab\" aria-controls=\"home\" aria-selected=\"true\"><img data-opt-id=1043530594  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/icon_security-4_blue.svg\"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" class=\"optimole-lazy-only  icon\"\/><br \/>Harden    <\/a>\n  <\/li>\n<\/ul>\n<div class=\"tab-content \" id=\"myTabContent\">\n<div class=\"tab-pane fade  active show custom_tabs_content \" id=\"tab_content_1\" role=\"tabpanel\" aria-labelledby=\"home-tab\">\n<p>We start with the essential task of identifying assets in your environment and defining your attack surface across network, perimeter, host, and accounts.<\/p>\n<p>\n<\/div>\n<div class=\"tab-pane fade  custom_tabs_content\" id=\"tab_content_2\" role=\"tabpanel\" aria-labelledby=\"home-tab\">\n<p>Then the Cyber Security Team contextualizes your attack surface coverage with risk policies, asset criticalities, and SLOs (service level objectives). This contextualization enables you to prepare your environment to end cyber risk.Once we have that perspective, the Cyber Security Team assesses and provides you with the risk priorities in your environment.<\/p>\n<p>\n<\/div>\n<div class=\"tab-pane fade  custom_tabs_content\" id=\"tab_content_3\" role=\"tabpanel\" aria-labelledby=\"home-tab\">\n<p>They then advise you on your remediation actions to ensure you are benchmarking against configuration best practices and continually hardening your security posture.<\/p>\n<p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"vGap15\"><\/div>\n<\/section>\n<section id=\"\" class=\"\">\n<div class=\"vGap15\"><\/div>\n<div class=\"container\">\n<div class=\"row\">\n<div class=\"col-lg-8 col-xs-12  text-left\">\n<h4 class=\"primary uppercase\"> <\/h4>\n<h3 class=\"  \">Benefits of Managed Risk <\/h3>\n<p class=\"xl\">\n<\/div><\/div>\n<div class=\"vGap25\"><\/div>\n<div class=\"row \">\n<div class=\"col-lg-4 col-xs-12 \">\n<div class=\"howItWorksTile \">\n<div class=\"content\">\n          <img data-opt-id=1249670026  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/042-webcam-blue.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4 class=\"capitalcase\">24&#215;7 Continuous Monitoring<\/h4>\n<p><p>Around-the-clock monitoring for vulnerabilities, system misconfigurations, and account takeover exposure across your endpoints, networks, and cloud environments.<\/p>\n<p>\n<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-lg-4 col-xs-12 \">\n<div class=\"howItWorksTile \">\n<div class=\"content\">\n          <img data-opt-id=305122491  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/041-infected-folder-blue.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4 class=\"capitalcase\">Strategic Recommendations<\/h4>\n<p><p>Your named Cyber Security engineer becomes your trusted security advisor, working with you to make recommendations that harden your security posture over time.<\/p>\n<p>\n<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-lg-4 col-xs-12 \">\n<div class=\"howItWorksTile \">\n<div class=\"content\">\n          <img data-opt-id=1090286920  data-opt-src=\"https:\/\/mlwdwcp8ntog.i.optimole.com\/w:auto\/h:auto\/q:mauto\/ig:avif\/https:\/\/cyberwissen.io\/pt\/wp-content\/uploads\/sites\/17\/2024\/03\/icon_strategy-1_blue.svg\"  class=\"optimole-lazy-only \"  decoding=\"async\" src=\"data:image/svg+xml,%3Csvg%20viewBox%3D%220%200%20100%%20100%%22%20width%3D%22100%%22%20height%3D%22100%%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Crect%20width%3D%22100%%22%20height%3D%22100%%22%20fill%3D%22transparent%22%2F%3E%3C%2Fsvg%3E\" \/><\/p>\n<div class=\"vGap10\"><\/div>\n<h4 class=\"capitalcase\">Personalized Engagement<\/h4>\n<p><p>Regular meetings with your named Cyber Security engineer to review your overall security posture and find areas of improvement that are optimized for your environment.<\/p>\n<p>\n<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"vGap15\"><\/div>\n<\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>CyberWissen\u00a0Managed Risk enables you to discover, assess, and harden your environment against digital risks by contextualizing your attack surface coverage across your networks, endpoints, and cloud environments.<\/p>\n","protected":false},"featured_media":2723,"template":"","meta":{"inline_featured_image":false},"class_list":["post-334","solution","type-solution","status-publish","has-post-thumbnail","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/solution\/334","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/solution"}],"about":[{"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/types\/solution"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/media\/2723"}],"wp:attachment":[{"href":"https:\/\/cyberwissen.io\/pt\/wp-json\/wp\/v2\/media?parent=334"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}