From Youtube


Is Your Vulnerability Management Program Irrelevant? Recommended Steps To Turn Vulnerability Management Into An Effective and Necessary Part of Your Security Process.

In this webcast, Scott Crawford from Enterprise Management Associates and Michelle Johnson Cobb of Skybox Security will discuss how to:

• Link vulnerability discovery, risk-based prioritization, and remediation activities to effectively mitigate risks before exploitation.

• Build a remediation strategy that addresses 'unpatchable' systems

• Minimize change management headaches by anticipating unintended impacts due to system and application interdependencies.

• Use metrics and key performance indicators (KPI's) like remediation latency to track effectiveness of the vulnerability management program.

Appears on these pages

File history

Click on a date/time to view the file as it appeared at that time.

current19:20, October 19, 2013Thumbnail for version as of 19:20, October 19, 2013480 × 269 (22 KB)BiomedGuy (wall | contribs)created video