filmov
tv
A CISO’s Guide to Effective Vulnerability Management
Показать описание
This briefing was based on the findings of a cross-sector task force of CISOs and staff who shared their challenges and best practices for developing effective vulnerability management practices. Topics discussed include: (1) managing vulnerabilities on premises, in the Cloud, and in third-party environments; (2) identification, classification, prioritization, and remediation best practices; (3) standards, charters; (4) organizational structures; and (5) scanning tools.
Supporting tools that will be shown during the briefing include: (1) A CISO’s Guide to Effective Vulnerabilities; and (2) Vulnerability Management Maturity Checklist.
Please join members of the Task Force as they share key insights to help you improve the effectiveness of your vulnerability management program.
Speakers:
Kristina Belnap, CISO, HealthEquity
Michael Flores, Security Engineer, HealthEquity
John Nagencast, Senior Information Security Architect
Jeremy Rowley, Lenovo and Motorola Mobility
Brad Skrbec, Lenovo and Motorola Mobility
Supporting tools that will be shown during the briefing include: (1) A CISO’s Guide to Effective Vulnerabilities; and (2) Vulnerability Management Maturity Checklist.
Please join members of the Task Force as they share key insights to help you improve the effectiveness of your vulnerability management program.
Speakers:
Kristina Belnap, CISO, HealthEquity
Michael Flores, Security Engineer, HealthEquity
John Nagencast, Senior Information Security Architect
Jeremy Rowley, Lenovo and Motorola Mobility
Brad Skrbec, Lenovo and Motorola Mobility