End-to-end orchestrated patching for CISA compliance

Logo
Presented by

Will Tome, Automation Strategist, Red Hat

About this talk

"As long as there is software, there will be patching. Now more than ever, security vulnerabilities left unpatched put agencies at significant risk. The Cost of a data breach report 2022 found that vulnerabilities in third-party software are some of the most costly breaches and are a common attack vector. Organizations that automate security incident response have a 74-day shorter recovery time. This is the largest, single cost-saving decision an agency can make to protect its systems and data. Cybersecurity and Infrastructure Security Agency (CISA) published a binding operational directive for federal civilian agencies that calls for a process (and actions) to remediate known exploited vulnerabilities within two weeks. Timelines could even be accelerated for vulnerabilities that pose a grave risk to the federal enterprise. Automation provides the ability to react at this speed and scale operations to busy IT teams. Vulnerabilities are not isolated to just an operating system, application, or device. They can come from any angle at any layer of the digital infrastructure, which requires a solution that helps IT teams work together. Additionally, the solution must be able to integrate with existing security response tools for streamlined and rapid response. Agencies that deploy an enterprise automation platform are better positioned to proactively secure their hybrid infrastructure, reducing response time and increasing compliance. Join this webinar to learn how Red Hat® Ansible® Automation Platform is the solution to meet modern cybersecurity challenges. In this webinar, we’ll cover: The risk of known exploits to the federal enterprise CISA-binding operational directive for remediating vulnerabilities How an enterprise automation strategy provides a security response in less time An overview of Ansible Automation Platform Join us to find out about the substantial value automation provides when responding to the security incidents and compliance requirements."
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (157)
Subscribers (43014)
Discover how Red Hat’s open hybrid cloud delivers IT services on any infrastructure quickly and cost effectively with a broad portfolio of hybrid cloud infrastructure, application services, cloud-native application development, and automation solutions.