Vulnerability management has been a staple of security teams for decades. But if you haven’t noticed, this space has evolved considerably over the last half decade. Long gone are the days of lengthy, hard-to-digest vulnerability scanning reports often created to check the PCI compliance checkbox. These days, smart IT security teams are investing in risk-based vulnerability management (RBVM) technologies and best practices to help prioritize which vulnerabilities to remediate first based on a variety of internal and external factors. Join Steve Piper, Founder & CEO of CyberEdge (and proud CISSP), as he:
- Recaps the evolution from VA, to VM, to RBVM
- Defines key elements of modern-day RBVM solutions
- Reviews internal and external factors to help prioritize vulnerability remediation
- Describes what to look for when evaluating best-of-breed RBVM offerings
- Summarizes the extraordinary benefits derived from RBVM deployments