The Cyber Risk Landscape: Vulnerability Management and Threat Intelligence
With organizations embracing a remote workforce, the attack surface has greatly expanded and introduced new levels of cyber risk—exposing flaws in existing vulnerability management strategies. For remote employee devices, these flaws often include inconsistent patching refreshes, the inability to pinpoint exploitability, and unclear collaboration between IT and Security.
According to Gartner, one of the three most important SOAR capabilities are threat and vulnerability management. Like automation, vulnerability management can support your security solutions by identifying issues and security breaches, making it easier to decide on a course of action.
In 2019, the numbers of vulnerabilities increased by over 17% from the year previously (Imperva) and in light of the increasingly distributed and remote workforce, we can only expect this number to continue to rise.
In this session, we will discuss:
- Providing centralized reporting and visibility of exploitability data, remediation progress, and playbook effectiveness
- Establishing workflows for a variety of use cases, including application and IT-based vulnerabilities, and software misconfiguration
- How to accelerate your response by 25%, dramatically reduce case backlog
- How Threat Intelligence Can be Used to Create a Phishing Playbook