Putting the Management into Vulnerability Management (or - YOU’VE GOT BEARS!!!)

This discussion covers all the necessary pieces for creating and distributing remediation plans, tracking remediation, and creating meaningful metrics for demonstrating success in vulnerability management. Current vulnerability management programs often stop at vulnerability identification (scan all the things!) and most organizations struggle to poise risk information in a way that is heard, understood, prioritized, and acted upon.

Presented by