The Evolution of Risk-based Vulnerability Management

Presented by

Steve Piper, CISSP, CEO & Founder, CyberEdge Group

About this talk

Vulnerability management has been a staple of security teams for decades. But if you haven’t noticed, this space has evolved considerably over the last half decade. Long gone are the days of lengthy, hard-to-digest vulnerability scanning reports often created to check the PCI compliance checkbox. These days, smart IT security teams are investing in risk-based vulnerability management (RBVM) technologies and best practices to help prioritize which vulnerabilities to remediate first based on a variety of internal and external factors. Join Steve Piper, Founder & CEO of CyberEdge (and proud CISSP), as he: - Recaps the evolution from VA, to VM, to RBVM - Defines key elements of modern-day RBVM solutions - Reviews internal and external factors to help prioritize vulnerability remediation - Describes what to look for when evaluating best-of-breed RBVM offerings - Summarizes the extraordinary benefits derived from RBVM deployments

Related topics:

More from this channel

Upcoming talks (5)
On-demand talks (412)
Subscribers (97647)
(ISC)² Security Briefings brings attendees both stand alone webcasts and multi-part series on cutting edge infosecurity topics that gets deeper into the subject matter and technologies presented by subject matter experts.