A CISO guide to effective vulnerability management

A CISO guide to effective vulnerability management

HomeCyber Risk Collaborative - A CRA ResourceA CISO guide to effective vulnerability management
A CISO guide to effective vulnerability management
ChannelPublish DateThumbnail & View CountDownload Video
Channel AvatarPublish Date not found Thumbnail
0 Views
This briefing was based on the findings of a cross-industry task force of CISOs and employees who shared their challenges and best practices for developing effective vulnerability management practices. Topics discussed include: (1) managing vulnerabilities on-premises, in the cloud, and in third-party environments; (2) best practices for identification, classification, prioritization, and remediation; (3) standards, charters; (4) organizational structures; and (5) scanning tools.
Supporting tools demonstrated during the meeting include: (1) A CISO Guide to Effective Vulnerabilities; and (2) a Vulnerability Management Maturity Checklist.

Attend task force meetings where they share key insights to help you improve the effectiveness of your vulnerability management program.

Speaker:

Kristina Belnap, CISO, HealthEquity
Michael Flores, Safety Engineer, HealthEquity
John Nagencast, Senior Information Security Architect
Jeremy Rowley, Lenovo and Motorola Mobility
Brad Skrbec, Lenovo and Motorola Mobility

Please take the opportunity to connect with your friends and family and share this video with them if you find it useful.