A key requirement for any Security Officer is reducing the risks of a cyber attack by finding and closing off holes in the IT infrastructure, and this is exactly what a sound vulnerability management (VM) program should do. An effective VM program should be designed to ensure that the people, processes, policies, and selected technologies work together to proactively protect, shield, and defend the enterprise from cyber threats. As threats cannot be completely eliminated, and as the Security Officer ...
13. Vulnerability Management Design
Get Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.