Purchase this Document
Price: $195.00 USD (PAGES: 17)
To purchase this document, you will need to register or sign in above.
A vulnerability is only as bad as the threat exploiting it and the impact on the organization. Security and risk management leaders should rate vulnerabilities on the basis of risk in order to improve vulnerability management program effectiveness.
Table of Contents
Implement Vulnerability Management as a Program That Involves Discovery, Prioritization and Then Treatment
- Don’t Bring Superstition to a Fact Fight
- Zero Day, a Problem or Not?
- The Vulnerability Landscape
Taking a Risk-Based Approach, Correlate Asset Value, Severity of Vulnerabilities and Threat Actor
Use Tools to Automate Vulnerability Treatment Prioritization
Use a Risk-Based Approach to Employ Mitigating Controls to Reduce the Attack Surface When You Are Unable to Patch Vulnerabilities
- Implement Vulnerability Management as a Program That Involves Discovery, Prioritization and Then Treatment
Gartner Recommended Reading