Cybersecurity vulnerability management plagues organizations around the world. Scans of networks routinely show rogue assets popping up on networks. Who authorized those servers or end points? Are they the adversary? Or could these new IP addresses be some innovative insider circumventing policy? Worse, if we shut them down, what harm will we cause to critical operations?
Participants will learn the 10 major obstacles to sound vulnerability management and the seven actions organizations can take immediately to foster resiliency. The workshop handout includes checklists and survey questions that participants can use to determine gaps, implement remediations, and reduce risk. Polls and facilitated interactive discussions allow participants to share what works.
Understand the 10 obstacles to effective vulnerability management and how to overcome them.
Identify the seven principles of effective Vulnerability Management and practical actions to maintain a patched, resilient cyber posture.
Understand the one unique component that needs to be included in cybersecurity vulnerability management to sustain the improved cyber posture regardless of the tools used or type of data protected.
MA, MBA, CISSP, PMP, ITIL,
Cyber Portfolio Manager,
GDIT (General Dynamics Information Technology)
You must be logged in and own this session in order to