Format:
Management lecture
Risk-based vulnerability management is still the first choice when it comes to deciding which vulnerabilities to fix first. But the modern attack surface is growing, constantly changing and more intertwined than ever before. In response, security teams are using a variety of security technologies - each with their own analyses and without consistent reporting. This leads to the use of disparate tools, duplication of effort and ineffective programmes, with no clear way to tangibly reduce risk or communicate an organisation's security posture quickly and accurately.
Risk-based vulnerability management is still the first choice when it comes to deciding which vulnerabilities to fix first. But the modern attack surface is growing, constantly changing and more interconne ...