Design and Implement a Vulnerability Management Program

This webinar occured on April 30, 2015

About This Webinar

Design and Implement a Vulnerability Management Program

Security vulnerabilities are rising in prevalence and exploitation, and are not only about software – they affect people, processes, and technology.

It is more important than ever to be aware of any information security vulnerabilities within your organization. It is not simply about identification though – you need to have a remediation plan to ensure that patches are developed and implemented properly to continue protecting your organization. How do you develop a management plan that identifies, prioritizes, and remediates your vulnerabilities?
We explored the following to help us understand the research landscape:
  • Which vulnerabilities are organizations facing the most?
  • Which business processes and policies are they affecting?
  • What are some best practices in the remediation of these vulnerabilities?
  • How can you ensure that your vulnerability plan is effective?

This is an On-Demand webinar:

This webinar was previously recorded. To view our upcoming live sessions visit our Webinars page.

Featured Speakers

James McCloskey
Senior Research Director and Executive Advisor, Security & Risk
Read Bio

Alan Tang
Director of Research, Security & Risk
Read Bio

Wesley McPherson
Associate Research Director, Security & Risk
Read Bio

Help lead your peers

Help make our research the best it can be. Sign-up for a phone interview with our analyst and share your experience with this project.

Research Interview

Exclusive workshops for the early bird

We are offering upcoming workshops to qualified companies to help us “road-test” our research. Sign-up to see if this valuable offer is right for you.

Exclusive Workshop
GET HELP Contact Us
VL Methodology