Skip to Main Content
Vulnerability Management
book

Vulnerability Management

by Park Foreman
August 2009
Intermediate to advanced content levelIntermediate to advanced
347 pages
9h 16m
English
Auerbach Publications
Content preview from Vulnerability Management
exeCution, rePorting, and analysis 223
ese are only two coarse examples of metrics that can be gathered at
the profiling stage. More detailed metrics can be created to more pre-
cisely monitor the state of the environment in the context of business
goals. Remember that processes in a VM program are intended to
align with business goals as articulated in the program charter.
Figure 7.4 shows an IT asset alignment report. is is useful to
senior IT management in gauging the level of spend or asset commit-
ment to a given business segment. It is generally considered common
business practice to rely on annual budget and expenditure reports to
determine ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Vulnerability Management, 2nd Edition

Vulnerability Management, 2nd Edition

Park Foreman

Publisher Resources

ISBN: 9781439801512