Detecting the Bear in Camp: How to Find Your True Vulnerabilities


Is it possible to be successful in a vulnerability centric world? Once you have great vulnerability management data, what do you do with it? Watch this session to learn how to find and focus on your true vulnerabilities to build stronger security. You will:

  • Learn how to optimize your vulnerability management program
  • Get best practices for the roles, responsibilities, processes, metrics, and strategies for full lifecycle vulnerability management program
  • Learn how to focus on the remediation that matters through improved communication, goal-setting, and measurement

Speakers: Jesika McEvoy, Senior Security Consultant, Rapid7 | Ryan Poppa, Senior Manager, Product Management, Rapid7

Fill out the form to watch the webcast