Threat and vulnerability management (TVM) is a core aspect of every information security program. Many organizations have some level of TVM in place, but frequently these tools are improperly deployed, missing critical automation processes, and are poorly aligned to business requirements. In this presentation, we identify critical aspects often overlooked at many points in the TVM lifecycle -- from architecture and deployment to daily tasks and automation.
If you are familiar with TVM tools and are involved in day to day operations, or if you are architecting and deploying a new installation, you’ll benefit from this talk.
You’ll leave with a better understanding of some best practices for architecting a deployment, building day to day operational tasks, aligning reporting with business processes, communicating vulnerabilities and risk to stakeholders, and adding automation to the TVM life cycle.