Over the past two years, the cybersecurity threat landscape has changed dramatically. COVID, ransomware, supply chain vulnerabilities, and the threat of hybrid war have caused organizations to put their Shield Up and prioritize the growing volume of cybersecurity work. Last year alone we saw more than 20,000 vulnerabilities disclosed. That’s an average of more than 50 every day. The increase in threats against IT, OT, and IoT has not always led to an increase in headcount and resources, so how are organizations supposed to manage the additional workload? In this presentation, Chuck Davis will explain the world of vulnerabilities and provide guidance on how to use a risk-based approach to managing and prioritizing your vulnerability management program.
- Understand modern challenges in vulnerability management
- Discover how to translate a vulnerability into a risk
- Learn processes and tools to create a risk-based vulnerability management program