Continuous Vulnerability Management: Striving for a 14 Day SLA presented at Data 2020

by Chris Goettl,

Summary : The importance of having a continuous vulnerability management process as part of an overall security program such as that provided by the CIS controls framework.When threat actors exploit weaknesses in an organization’s IT infrastructure, the consequences can be devastating to productivity, reputation, and financially. Without treating cybersecurity as an ongoing process, hackers can find, weaponize, deploy, and attack your infrastructure faster than your team can patch the vulnerability leaving your infrastructure unprotected. Your systems may be secure today, but next week, a cybersecurity criminal may discover and exploit a critical vulnerability in your environment. Join us as we discuss how continuous vulnerability management can be executed effectively.