2.1 Introduction2.2 The Vulnerability Creation Process2.2.1 Complexity2.2.2 Communication2.2.3 Interoperability2.3 Creating Vulnerabilities: An Example2.4 Rationale for a VM Program2.4.1 Overexposed Network2.4.2 No Standard for Secure Systems Configuration2.4.3 Risk of Major Financial Loss2.4.4 Loss of Revenue2.4.5 Lost Productivity2.5 VM Program Failure2.5.1 Case Study #1: Getting the Organization Behind You2.5.1.1 Events2.5.1.2 Analysis2.5.2 Case Study #2: Technology Integration Challenge2.5.2.1 Events2.5.2.2 AnalysisEnd Note