Building a Scalable Vulnerability Management Program for Effective Risk Management
Offered By: YouTube
Course Description
Overview
Learn how to build and maintain a scalable vulnerability management program for effective risk management in this 49-minute conference talk. Explore key components including asset prioritization, scope definition, stakeholder engagement, and database architecture. Discover best practices for vulnerability scanning, severity rating, remediation, and decommissioning. Address challenges such as false positives and exceptions, while implementing robust reporting, auditing, and continuous maintenance processes. Gain insights into authentication reports and overcome common obstacles to create a comprehensive vulnerability management strategy.
Syllabus
Introduction
Vulnerability Management
Prioritize Assets
Complete Scope
Stakeholders
Architecture
Database
Dashboard
Vulnerability Scanning
Vulnerability Severity Rating
Vulnerability Remediation
Vulnerability Decommission
False Positives
False Positive Examples
Exceptions Process
Reporting Findings
Audit
Continuous Maintenance
Authentication Reports
Challenges
Summary
Questions
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube