This page is fully or partially automatically translated.

Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Header of Tenable Network Security GmbH
Forums it-sa Expo Knowledge Forum B

Vulnerability management: Holistic strategies for minimizing attack surfaces

This presentation will give you a comprehensive overview of modern approaches to vulnerability management.

calendar_today Tue, 22.10.2024, 13:45 - 14:00

event_available On site

place Forum, Booth 6-235

Action description

south_east

Themes

Data protection / GDPR Data security / DLP / Know-how protection Governance, Riskmanagement and Compliance

Key Facts

  • New, holistic approaches for your vulnerability management
  • Holistic strategies for minimising attack surfaces

Event

This action is part of the event Forums it-sa Expo

Action description

In our presentation ‘Vulnerability management: Holistic strategies to minimise attack surfaces’, you will receive a comprehensive overview of modern approaches to vulnerability management. Traditional methods are often no longer sufficient to counter the growing threats in today's digital landscape. Therefore, we introduce the concept of Vulnerability Management 2.0, which is characterised by a holistic view and the integration of advanced security strategies.

Learn how vulnerability management has evolved from its beginnings to today. We start with a historical review and show the transition from reactive to proactive security measures.
Core components of vulnerability management 2.0:

- Attack Surface Management (ASM): Learn how to identify and manage all potential attack vectors.
- Attack Path Analysis: Understand how analysing potential attack paths helps you identify and remediate vulnerabilities.
- Hardening Audits: Learn how regular audits and implementing best practices help harden systems.
- Identity checks and controls: Discover how monitoring and controlling identities and access rights protects your IT infrastructure.
- Configuration controls: Gain insights into ensuring correct and secure system and application configurations.

- Integration and synergies: Find out how the integration of these components creates a robust and comprehensive security strategy. Using concrete case studies, we show how companies have successfully implemented Vulnerability Management 2.0 and significantly reduced their security risks.
- Outlook and future trends: Finally, we will take a look at upcoming technologies and methods in vulnerability management and offer a future vision of how companies can evolve to better cope with future threats.

This presentation is aimed at IT security professionals looking to expand and update their strategies to effectively address current and future cybersecurity challenges. Join us on this journey and discover new, holistic approaches to your vulnerability management. 

 

... read more

Language: German

Questions and Answers: No

close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.