Home - JASON SUTTIE
Welcome to my share-space.
Technology, Jason Suttie, Leadership, Coaching, Motivation, Banking, Blockchain, BSG, Foundery, RMB, Jason, Suttie, Engineering, Fintech
219
home,paged,page-template,page-template-bridge,page-template-blog-masonry,page-template-bridgeblog-masonry-php,page,page-id-219,paged-3,page-paged-3,ajax_fade,page_not_loaded,,qode-title-hidden,qode_grid_1300,footer_responsive_adv,qode-theme-ver-16.2.1,qode-theme-bridge,disabled_footer_bottom,wpb-js-composer js-comp-ver-5.4.7,vc_responsive

[vc_row css_animation="" row_type="row" use_row_as_full_screen_section="no" type="grid" angled_section="no" text_align="left" background_image_as_pattern="without_pattern" css=".vc_custom_1463146108811{padding-bottom: 20px !important;}"][vc_column offset="vc_col-lg-offset-1 vc_col-lg-10 vc_col-md-offset-1 vc_col-md-10"][vc_column_text][dropcaps type='normal' font_size='45' color='#191919' background_color='' border_color='']T[/dropcaps]ypically, IT policies cover many aspects of technology – including security. These policies are written in elaborate documents and then are stored somewhere cryptic. Then we hire experts to come in and manually run penetration tests against the environment which gives us measurement feedback on both compliance and vulnerabilities. We then take these manually generated penetration test reports and ask people in...