How do you currently involve departments and teams outside IT/security in your vulnerability management efforts, if at all?

791 viewscircle icon2 Comments
Sort by:
Mission Diplomatic Technology Officer in Government2 years ago

As a risk statement with customer archetype check in every six months. Will only highlight maybe one risk that is appropriate to them out of our 20, but follow with the list of all risks we are tracking in our portfolio.

Have not measured for effectiveness, but it does creat awareness and a level of alliance-ship. Removes the use versus then and shapes it more as a we problem. Also helps gain perspective on their risks that I might not know or understand.

Anecdotally we feel there is more customer actions and partnership when we raise a vulnerability we are working to mitigate.

CISO in Education2 years ago

Coordinate Vulnerability Management Team (VMT) meetings to try and collaborate and/or facilitate remediation of vulnerabilities. Often, we've found that folks want to try and do the right thing, but don't necessarily have the connections or the the right level of influence to drive a vendor to fix an issue and/or prioritize an effort internally. 

Content you might like

Ease of getting my data into the DAaaS platform9%

Tools that make it easy to create use cases with the DAaaS platform41%

A pre-existing library of dashboards and report templates to help me quickly get up-and-running32%

The ability to try out the DAaaS platform for free before buying10%

Services from the DAaaS vendor (consulting, support, training)3%

Confidence that my data is safe in the cloud2%

View Results

AI-driven threats (deepfakes, automated attacks) 18%

Software supply chain risks 24%

Insider risk (both malicious & accidental) 13%

Regulatory compliance 13%

Cloud misconfigurations 13%

Shadow IT (or shadow AI) 8%

Ransomware 5%

Talent shortage in cybersecurity3%

Something else (comment to explain)3%

View Results