Vulnerability Management should be at the core of every Information Security program (it’s CIS Control #3) and yet it is often one of the most misunderstood elements. Requiring strong leadership and many foundational elements to be successful, programs often topple because the legs of the table we have built are not sturdy to hold the weight of our scanning tools, and the data these tools produce.
Join Rapid7’s Brian Carey for a discussion on some of the more common reasons Vulnerability Management programs fail, and more importantly what we can all do to ensure that doesn’t happen.
Some of the topics we’ll cover include:
- The leadership void - setting goals and expectations from the top.
- Roles & Responsibilities
- Asset Management
- Classification & Prioritization
- Reporting to your Executive Teams & Board
Principal Advisory Services Consultant, Rapid7