Establishing a Vulnerability and Threat Management Program presented at GrrCon 2013

by Chris Banta,

Summary : With an ever evolving threat landscape, how does an organization safeguard and protect critical infrastructure and corporate assets. This session is designed for the security professional who is looking for solutions and methods to develop a stronger and more agile security operations program. In this discussion we will uncover 5 of the primary components needed to build and manage a successful VTM program
System and Application Inventory
Baseline Configuration Standards
System and Application Patch Management
Vulnerability Scanning and Penetration Testing
Risk Analysis, Threat Monitoring, Validation and Metrics