InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

The Evolution of Risk-based Vulnerability Management

Presented by

Steve Piper, CISSP, CEO & Founder, CyberEdge Group

About this talk

Vulnerability management has been a staple of security teams for decades. But if you haven’t noticed, this space has evolved considerably over the last half decade. Long gone are the days of lengthy, hard-to-digest vulnerability scanning reports often created to check the PCI compliance checkbox. These days, smart IT security teams are investing in risk-based vulnerability management (RBVM) technologies and best practices to help prioritize which vulnerabilities to remediate first based on a variety of internal and external factors. Join Steve Piper, Founder & CEO of CyberEdge (and proud CISSP), as he: - Recaps the evolution from VA, to VM, to RBVM - Defines key elements of modern-day RBVM solutions - Reviews internal and external factors to help prioritize vulnerability remediation - Describes what to look for when evaluating best-of-breed RBVM offerings - Summarizes the extraordinary benefits derived from RBVM deployments
ISC2 Knowledge Vault

ISC2 Knowledge Vault

162002 subscribers177 talks
Information Security Certification
The ISC2 Knowledge Vault brings the community relevant and cutting edge infosecurity discussions presented by subject matter experts. Subscribers also benefit from pre-recorded mini webcasts that give viewers a sneak peek into each of ISC2’s certifications' domains, including the gold standard cybersecurity certification, the CISSP, and ISC2’s fastest growing certification, the CCSP.
Related topics