A CISO guide to effective vulnerability management
Channel | Publish Date | Thumbnail & View Count | Download Video |
---|---|---|---|
Publish Date not found | 0 Views |
This briefing was based on the findings of a cross-industry task force of CISOs and employees who shared their challenges and best practices for developing effective vulnerability management practices. Topics discussed include: (1) managing vulnerabilities on-premises, in the cloud, and in third-party environments; (2) best practices for identification, classification, prioritization, and remediation; (3) standards, charters; (4) organizational structures; and (5) scanning tools.
Supporting tools demonstrated during the meeting include: (1) A CISO Guide to Effective Vulnerabilities; and (2) a Vulnerability Management Maturity Checklist.
Supporting tools demonstrated during the meeting include: (1) A CISO Guide to Effective Vulnerabilities; and (2) a Vulnerability Management Maturity Checklist.
Attend task force meetings where they share key insights to help you improve the effectiveness of your vulnerability management program.
Speaker:
Kristina Belnap, CISO, HealthEquity
Michael Flores, Safety Engineer, HealthEquity
John Nagencast, Senior Information Security Architect
Jeremy Rowley, Lenovo and Motorola Mobility
Brad Skrbec, Lenovo and Motorola Mobility
Please take the opportunity to connect with your friends and family and share this video with them if you find it useful.