The Evolution of Risk-based Vulnerability Management

Logo
Presented by

Steve Piper, CISSP, CEO & Founder, CyberEdge Group

About this talk

Vulnerability management has been a staple of security teams for decades. But if you haven’t noticed, this space has evolved considerably over the last half decade. Long gone are the days of lengthy, hard-to-digest vulnerability scanning reports often created to check the PCI compliance checkbox. These days, smart IT security teams are investing in risk-based vulnerability management (RBVM) technologies and best practices to help prioritize which vulnerabilities to remediate first based on a variety of internal and external factors. Join Steve Piper, Founder & CEO of CyberEdge (and proud CISSP), as he: - Recaps the evolution from VA, to VM, to RBVM - Defines key elements of modern-day RBVM solutions - Reviews internal and external factors to help prioritize vulnerability remediation - Describes what to look for when evaluating best-of-breed RBVM offerings - Summarizes the extraordinary benefits derived from RBVM deployments
Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (137)
Subscribers (124042)
The ISC2 Knowledge Vault brings the community relevant and cutting edge infosecurity discussions presented by subject matter experts. Subscribers also benefit from pre-recorded mini webcasts that give viewers a sneak peek into each of ISC2’s certifications' domains, including the gold standard cybersecurity certification, the CISSP, and ISC2’s fastest growing certification, the CCSP.