{"id":87160,"date":"2024-04-25T11:46:20","date_gmt":"2024-04-25T18:46:20","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/webinars\/the-dark-side-of-ai-how-generative-ai-empowers-hackers-copy\/"},"modified":"2024-05-31T12:46:40","modified_gmt":"2024-05-31T19:46:40","slug":"closing-the-gap-a-proactive-approach-to-mitigating-cyber-risks","status":"publish","type":"page","link":"https:\/\/www.forescout.com\/webinars\/closing-the-gap-a-proactive-approach-to-mitigating-cyber-risks\/","title":{"rendered":"Closing the Gap: A Proactive Approach to Mitigating Cyber Risks"},"content":{"rendered":"<p>WEBINAR<\/p>\n<h1>Closing the Gap: A Proactive Approach to Mitigating Cyber Risks<\/h1>\n<p>\u00a0<\/p>\n<p>Organizations have recognized the daunting challenge of addressing every vulnerability and exposure within their intricate environments. This realization stems from the complexity of modern IT landscapes, which often encompass a diverse array of systems, devices, and applications. Despite efforts to secure these environments, the dynamic nature of cyber threats means that new vulnerabilities can emerge rapidly. This, coupled with the major shortage of cybersecurity skills and personnel, poses even greater challenges for organizations in staying ahead of potential risks.<\/p>\n<p>To address these growing challenges, organizations must adopt a resilient defense strategy that prioritizes a continuous cycle of identifying cyber assets, quantifying vulnerabilities based on risk, and taking proactive measures to minimize exposures.<\/p>\n<h5 style=\"color: #009dea\">During this webinar, you\u2019ll gain insight into:<\/h5>\n<ul>\n<li><strong>Decoding Cyber Risk:<\/strong> You can\u2019t be proactive without being actionable.<\/li>\n<li><strong>Unlocking the Power Trio:<\/strong> Got CAASM, RBVM, and CTEM? \u2013 what\u2019s next on your checklist?<\/li>\n<li><strong>Driving Business Resilience:<\/strong> 4 use cases for achieving business-focused outcomes.<\/li>\n<\/ul>\n<h4 style=\"color: #009dea\">Featured Speaker:<\/h4>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-46206\" style=\"width: 25%;height: auto;margin-right: 5%\" src=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/reza-k-in-circle.png\" alt=\"\" width=\"300\" height=\"300\"><\/p>\n<p style=\"text-align: left;width: 70%;align-self: center\"><strong>Reza Koohrangpour<\/strong><br \/>\nREM Product Marketing Director<br \/>\nForescout\n\n<p><a target=\"_blank\" href=\"\/company\/legal\/notice-of-collection\/\" rel=\"noopener\">Notice of Collection<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>WEBINAR Closing the Gap: A Proactive Approach to Mitigating Cyber Risks \u00a0 Organizations have recognized the daunting challenge of addressing every vulnerability and exposure within their intricate environments. This realization stems from the complexity of modern IT landscapes, which often encompass a diverse array of systems, devices, and applications. Despite efforts to secure these environments, [&hellip;]<\/p>\n","protected":false},"author":165,"featured_media":87158,"parent":84198,"menu_order":204,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"coauthors":[712],"class_list":["post-87160","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Closing the Gap: Proactive Cyber Risk Mitigation Strategies<\/title>\n<meta name=\"description\" content=\"Discover how to tackle cyber threats with a proactive defense strategy. Gain insights on decoding cyber risk and driving business resilience.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/webinars\/closing-the-gap-a-proactive-approach-to-mitigating-cyber-risks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Closing the Gap: Proactive Cyber Risk Mitigation Strategies\" \/>\n<meta property=\"og:description\" content=\"Discover how to tackle cyber threats with a proactive defense strategy. Gain insights on decoding cyber risk and driving business resilience.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/webinars\/closing-the-gap-a-proactive-approach-to-mitigating-cyber-risks\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-31T19:46:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/REM-Webinar-Feature-v1-1200x628-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/webinars\/closing-the-gap-a-proactive-approach-to-mitigating-cyber-risks\/\",\"url\":\"https:\/\/www.forescout.com\/webinars\/closing-the-gap-a-proactive-approach-to-mitigating-cyber-risks\/\",\"name\":\"Closing the Gap: Proactive Cyber Risk Mitigation Strategies\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/webinars\/closing-the-gap-a-proactive-approach-to-mitigating-cyber-risks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/webinars\/closing-the-gap-a-proactive-approach-to-mitigating-cyber-risks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/REM-Webinar-Feature-v1-1200x628-1.png\",\"datePublished\":\"2024-04-25T18:46:20+00:00\",\"dateModified\":\"2024-05-31T19:46:40+00:00\",\"description\":\"Discover how to tackle cyber threats with a proactive defense strategy. Gain insights on decoding cyber risk and driving business resilience.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/webinars\/closing-the-gap-a-proactive-approach-to-mitigating-cyber-risks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/webinars\/closing-the-gap-a-proactive-approach-to-mitigating-cyber-risks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/webinars\/closing-the-gap-a-proactive-approach-to-mitigating-cyber-risks\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/REM-Webinar-Feature-v1-1200x628-1.png\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/REM-Webinar-Feature-v1-1200x628-1.png\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/webinars\/closing-the-gap-a-proactive-approach-to-mitigating-cyber-risks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Webinars\",\"item\":\"https:\/\/www.forescout.com\/webinars\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Closing the Gap: A Proactive Approach to Mitigating Cyber Risks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Closing the Gap: Proactive Cyber Risk Mitigation Strategies","description":"Discover how to tackle cyber threats with a proactive defense strategy. Gain insights on decoding cyber risk and driving business resilience.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/webinars\/closing-the-gap-a-proactive-approach-to-mitigating-cyber-risks\/","og_locale":"en_US","og_type":"article","og_title":"Closing the Gap: Proactive Cyber Risk Mitigation Strategies","og_description":"Discover how to tackle cyber threats with a proactive defense strategy. Gain insights on decoding cyber risk and driving business resilience.","og_url":"https:\/\/www.forescout.com\/webinars\/closing-the-gap-a-proactive-approach-to-mitigating-cyber-risks\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_modified_time":"2024-05-31T19:46:40+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/REM-Webinar-Feature-v1-1200x628-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/webinars\/closing-the-gap-a-proactive-approach-to-mitigating-cyber-risks\/","url":"https:\/\/www.forescout.com\/webinars\/closing-the-gap-a-proactive-approach-to-mitigating-cyber-risks\/","name":"Closing the Gap: Proactive Cyber Risk Mitigation Strategies","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/webinars\/closing-the-gap-a-proactive-approach-to-mitigating-cyber-risks\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/webinars\/closing-the-gap-a-proactive-approach-to-mitigating-cyber-risks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/REM-Webinar-Feature-v1-1200x628-1.png","datePublished":"2024-04-25T18:46:20+00:00","dateModified":"2024-05-31T19:46:40+00:00","description":"Discover how to tackle cyber threats with a proactive defense strategy. Gain insights on decoding cyber risk and driving business resilience.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/webinars\/closing-the-gap-a-proactive-approach-to-mitigating-cyber-risks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/webinars\/closing-the-gap-a-proactive-approach-to-mitigating-cyber-risks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/webinars\/closing-the-gap-a-proactive-approach-to-mitigating-cyber-risks\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/REM-Webinar-Feature-v1-1200x628-1.png","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/REM-Webinar-Feature-v1-1200x628-1.png","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/webinars\/closing-the-gap-a-proactive-approach-to-mitigating-cyber-risks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Webinars","item":"https:\/\/www.forescout.com\/webinars\/"},{"@type":"ListItem","position":3,"name":"Closing the Gap: A Proactive Approach to Mitigating Cyber Risks"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]}]}},"featured_media_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2024\/04\/REM-Webinar-Feature-v1-1200x628-1.png","is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/87160","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/165"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=87160"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/87160\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/84198"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media\/87158"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=87160"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=87160"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}