Is Your Vulnerability Management Program Keeping Pace With Risks?
VP Product Marketing
Michelle Johnson Cobb is an industry thought leader and technology marketer with a passion for bringing innovative technology solutions to market. Prior to Skybox Security, Cobb led product marketing programs at McAfee, LogLogic, Tumbleweed Communications, and several startups, bringing to market solutions for endpoint protection, vulnerability management, network access control, risk & compliance management, email security, and disaster recovery systems. Ms Cobb has a Masters degree in Business and Bachelor's degree in Computer Science, both from the University of Michigan.
A long-time business and technology journalist, Peter has held senior editorial positions with PlanetIT.com, Inc. magazine, InformationWeek magazine, DSO.com, TechBuilder.com, Smart Enterprise magazine, and the BusinessWeek newsletter group. He has written articles for CFO magazine, newsletters and blogs for Nokia, and case studies for Accenture and CSC. Peter is also a frequent speaker and webcast moderator. He lives and works in Brooklyn, New York.
Ed Mosquera has more than 20 years of experience in enterprise network security operations, integration and engineering. Currently a Security Consultant at Skybox Security, Ed has held network security positions with Bank of America, IBM Tivoli, and Visual Solutions, Inc where he worked onsite at the Department of Homeland Security at their FLETC (Federal Law Enforcement Training Center) compound.
To effectively reduce the risks of cyber attacks, comply with continuous monitoring requirements, and provide visibility to executives, organizations need to manage their vulnerabilities and associated risks continuously. This is required in order to match or exceed the daily rate of attacks.
Why bother to assess your risks every 90 days when new threats are unleashed every day?
Register for this webcast to see how you can:
- Transform vulnerability discovery from a ‘round robin’ schedule to continuous monitoring for vulnerabilities
- Prioritize vulnerabilities based on exploitability and potential business impact
- Focus remediation efforts and track progress to show a measurable reduction of risk
- Make vulnerability management an essential part of daily change management processes
This webcast will include case studies, survey data, and best practices – ideal for IT security practitioners who are considering, or already implementing, next-generation vulnerability management to effectively and measurably mitigate risk.