YoVDO

Building a Scalable Vulnerability Management Program for Effective Risk Management

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Risk Management Courses IT Governance Courses Stakeholder Engagement Courses Vulnerability Management Courses Vulnerability Scanning Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn how to build and maintain a scalable vulnerability management program for effective risk management in this 49-minute conference talk. Explore key components including asset prioritization, scope definition, stakeholder engagement, and database architecture. Discover best practices for vulnerability scanning, severity rating, remediation, and decommissioning. Address challenges such as false positives and exceptions, while implementing robust reporting, auditing, and continuous maintenance processes. Gain insights into authentication reports and overcome common obstacles to create a comprehensive vulnerability management strategy.

Syllabus

Introduction
Vulnerability Management
Prioritize Assets
Complete Scope
Stakeholders
Architecture
Database
Dashboard
Vulnerability Scanning
Vulnerability Severity Rating
Vulnerability Remediation
Vulnerability Decommission
False Positives
False Positive Examples
Exceptions Process
Reporting Findings
Audit
Continuous Maintenance
Authentication Reports
Challenges
Summary
Questions


Related Courses

Introduction to Finance
University of Michigan via Coursera
Information Security and Risk Management in Context
University of Washington via Coursera
Financial Engineering and Risk Management
Columbia University via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Caries Management by Risk Assessment (CAMBRA)
University of California, San Francisco via Coursera