About This Webinar

Design and Implement a Vulnerability Management Program

Security vulnerabilities are rising in prevalence and exploitation, and are not only about software – they affect people, processes, and technology.

It is more important than ever to be aware of any information security vulnerabilities within your organization. It is not simply about identification though – you need to have a remediation plan to ensure that patches are developed and implemented properly to continue protecting your organization. How do you develop a management plan that identifies, prioritizes, and remediates your vulnerabilities?
We explored the following to help us understand the research landscape:
  • Which vulnerabilities are organizations facing the most?
  • Which business processes and policies are they affecting?
  • What are some best practices in the remediation of these vulnerabilities?
  • How can you ensure that your vulnerability plan is effective?

This is an On-Demand webinar:

This webinar was previously recorded. To view our upcoming live sessions visit our Webinars page.

Featured Speakers

James McCloskey

Senior Research Director and Executive Advisor, Security & Risk
Read Bio

Alan Tang

Director of Research, Security & Risk
Read Bio

Wesley McPherson

Associate Research Director, Security & Risk
Read Bio