255
8
pl a n n I n g
8.1 Introduction
Up to this point, I have discussed the various aspects of vulnerability
management (VM) and their relevance to the overall VM process. I
have also described the broader role of VM in an organization’s risk
management function and maintenance of security posture. Many of
the individual stages of implementing VM have been described, such
as the development of policies, processes, and requirements. But, what
is needed now are a project plan, checklists, and strategies to get the
program off the ground.
is chapter will provide you with the checklists, plans, strategies,
and advice to help you develop a complete VM program in a large,
globally distributed company. Some selectivity and tailoring will be
required ...