Governance & Risk Management , IT Risk Management

Asset Management's Role in Improving Security

Axonius' Lenny Zeltser Discusses Better Ways to Manage Risk
Lenny Zeltser, CISO, Axonius

Asset management, which is sometimes overlooked, can help improve security plans and reduce risk, says Lenny Zeltser of Axonius, who offers strategic insights.

See Also: Maintain a Clear Bill of (Third-Party Risk) Health

In a video interview with Information Security Media Group, Zeltser discusses several issues that will addressed in an upcoming series of virtual roundtables, including:

  • Why asset management is sometimes overlooked as a cybersecurity priority;
  • How CISOs can better define asset management;
  • Key strategies and practices for including asset management in your organization's security plan.

Zeltser is chief information security officer at Axonius. Prior to Axonius, Zeltser led security product management at Minerva Labs and NCR. Before that, he spearheaded the U.S. security consulting practice at a leading cloud services provider acquired by CenturyLink. Zeltser also helps shape global cybersecurity practices by teaching at SANS Institute and sharing knowledge through writing, public speaking and community projects. He has earned the prestigious GIAC Security Expert designation and developed the Linux malware analysis toolkit REMnux. Zeltser is also on the board of directors of the SANS Technology Institute.


About the Author

Scott Ferguson

Scott Ferguson

Managing Editor, News Desk

Ferguson is the managing editor for the news desk at Information Security Media Group. He's been covering the IT industry for more than 13 years. Before joining ISMG, Ferguson was editor-in-chief at eWEEK and director of audience development for InformationWeek. He's also written and edited for Light Reading, Security Now, Enterprise Cloud News, TU-Automotive, Dice Insights and DevOps.com.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.