The New Vulnerability and Risk Management (VRM) Paradigm: Holistic, Dynamic, Adaptive
The ability to perform effective Vulnerability Risk Management (VRM) is an important marker of IT security maturity. Why? Managing the flow of vulnerabilities in complex IT environments is a major challenge. So is recognizing, categorizing, and prioritizing IT security risks. The solution? Put these two together!The increasing complexity of IT environments is stretching many vulnerability tools and frameworks beyond their effective range, creating dangerous, exploitable security gaps. This IT evolution necessitates a more adaptive, risk-based approach to vulnerability management. Dan Blum, Principal Consultant from Security Architects Partners, recommends that enterprises combine asset intelligence and vulnerability intelligence with holistic risk management processes to prioritize remediation activities.
Join internationally-recognized expert in security, privacy, cloud computing and identity management, Dan Blum, and learn how to:
- Use and maintain asset risk profiles
- Triage vulnerabilities and other risk issues
- Use vulnerability intelligence in agile risk assessments to prioritize risk treatment
- Tune VRM continuously by mapping threat intelligence to vulnerabilities on a strategic risk register