A CISO’s Guide to Effective Vulnerability Management

preview_player
Показать описание
This briefing was based on the findings of a cross-sector task force of CISOs and staff who shared their challenges and best practices for developing effective vulnerability management practices. Topics discussed include: (1) managing vulnerabilities on premises, in the Cloud, and in third-party environments; (2) identification, classification, prioritization, and remediation best practices; (3) standards, charters; (4) organizational structures; and (5) scanning tools.
Supporting tools that will be shown during the briefing include: (1) A CISO’s Guide to Effective Vulnerabilities; and (2) Vulnerability Management Maturity Checklist.

Please join members of the Task Force as they share key insights to help you improve the effectiveness of your vulnerability management program.

Speakers:

Kristina Belnap, CISO, HealthEquity
Michael Flores, Security Engineer, HealthEquity
John Nagencast, Senior Information Security Architect
Jeremy Rowley, Lenovo and Motorola Mobility
Brad Skrbec, Lenovo and Motorola Mobility
Рекомендации по теме