Implement a Risk-Based Approach to Vulnerability Management
Analyst(s): Prateek Bhajanka | Craig Lawson
Purchase this Document
Price: $195.00 USD (PAGES: 17)
To purchase this document, you will need to register or sign in above.
Summary
A vulnerability is only as bad as the threat exploiting it and the impact on the organization. Security and risk management leaders should rate vulnerabilities on the basis of risk in order to improve vulnerability management program effectiveness.
Table of Contents
-
Introduction
-
Analysis
-
Implement Vulnerability Management as a Program That Involves Discovery, Prioritization and Then Treatment
- Don’t Bring Superstition to a Fact Fight
- Zero Day, a Problem or Not?
- The Vulnerability Landscape
-
Taking a Risk-Based Approach, Correlate Asset Value, Severity of Vulnerabilities and Threat Actor
-
Use Tools to Automate Vulnerability Treatment Prioritization
-
Use a Risk-Based Approach to Employ Mitigating Controls to Reduce the Attack Surface When You Are Unable to Patch Vulnerabilities
-
Implement Vulnerability Management as a Program That Involves Discovery, Prioritization and Then Treatment
-
Gartner Recommended Reading