Risk-Based Vulnerability Management

Logo
Presented by

Marc Cohen, Client Security Principal, ePlus | Kevin Flynn, Sr. Manager, Product Marketing, Tenable

About this talk

As vulnerability management evolves, organizations are seeing an increased need for prioritization, benchmarking, and flexible reporting. Risk-based vulnerability management (RBVM) is a process that reduces vulnerabilities across your attack surface by prioritizing remediation based on the risks they pose to your organization. Risk-based vulnerability management uses asset criticality, vulnerability severity, and threat actor activity, allowing you to understand vulnerability risks with threat context and insight into potential business impact. It helps you cut through vulnerability overload so you can focus on the relatively few vulnerabilities that pose the most risk to your enterprise. • Learn How to Prioritize Vulnerabilities Based on Risk • Differences Between Legacy Vulnerability Management and Risk-Based Vulnerability Management • Vulnerability Management as a Service: Take the burden off your resources so they can focus on other critical tasks.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (106)
Subscribers (5288)
ePlus engineers transformative technology solutions for the most visionary organizations in the world. Through our master architects, engineers, and consultants, we see our clients’ horizons and craft sustainable IT roadmaps to get them there. Then we make it happen. This takes imagination, relentless client service, and the tenacity to enable our clients to achieve their visions. Our deep partnerships with top manufacturers—many who look to us for their own technology needs—keep us immersed across the IT ecosystem. From strategy to fulfillment to managed services, we enable our clients to realize what it means for technology to do more.