Cyber Portfolio Manager GDIT (General Dynamics Information Technology) Arlington, Virginia, United States
Cybersecurity vulnerability management plagues organizations around the world. Scans of networks routinely show rogue assets popping up on networks. Who authorized those servers or end points? Are they the adversary? Or could these new IP addresses be some innovative insider circumventing policy? Worse, if we shut them down, what harm will we cause to critical operations?
Participants will learn the 10 major obstacles to sound vulnerability management and the seven actions organizations can take immediately to foster resiliency. The workshop handout includes checklists and survey questions that participants can use to determine gaps, implement remediations, and reduce risk. Polls and facilitated interactive discussions allow participants to share what works.
Learning Objectives:
Understand the 10 obstacles to effective vulnerability management and how to overcome them.
Identify the seven principles of effective Vulnerability Management and practical actions to maintain a patched, resilient cyber posture.
Understand the one unique component that needs to be included in cybersecurity vulnerability management to sustain the improved cyber posture regardless of the tools used or type of data protected.