Is Your Vulnerability Management Program Keeping Pace With Risks?

Is Your Vulnerability Management Program Keeping Pace With Risks?

 

Available On Demand
Duration 60min
Speakers
Michelle Cobb
VP Product Marketing
Skybox Security
Michelle Cobb
Michelle Johnson Cobb is an industry thought leader and technology marketer with a passion for bringing innovative technology solutions to market. Prior to Skybox Security, Cobb led product marketing programs at McAfee, LogLogic, Tumbleweed Communications, and several startups, bringing to market solutions for endpoint protection, vulnerability management, network access control, risk & compliance management, email security, and disaster recovery systems. Ms Cobb has a Masters degree in Business and Bachelor's degree in Computer Science, both from the University of Michigan.
Peter Krass
Contributing Editor
InformationWeek
Peter Krass
A long-time business and technology journalist, Peter has held senior editorial positions with PlanetIT.com, Inc. magazine, InformationWeek magazine, DSO.com, TechBuilder.com, Smart Enterprise magazine, and the BusinessWeek newsletter group. He has written articles for CFO magazine, newsletters and blogs for Nokia, and case studies for Accenture and CSC. Peter is also a frequent speaker and webcast moderator. He lives and works in Brooklyn, New York.
Edward Mosquera
Security Consultant
Skybox Security
Edward Mosquera
Ed Mosquera has more than 20 years of experience in enterprise network security operations, integration and engineering. Currently a Security Consultant at Skybox Security, Ed has held network security positions with Bank of America, IBM Tivoli, and Visual Solutions, Inc where he worked onsite at the Department of Homeland Security at their FLETC (Federal Law Enforcement Training Center) compound.

To effectively reduce the risks of cyber attacks, comply with continuous monitoring requirements, and provide visibility to executives, organizations need to manage their vulnerabilities and associated risks continuously. This is required in order to match or exceed the daily rate of attacks.

Why bother to assess your risks every 90 days when new threats are unleashed every day?

Register for this webcast to see how you can:

  • Transform vulnerability discovery from a ‘round robin’ schedule to continuous monitoring for vulnerabilities
  • Prioritize vulnerabilities based on exploitability and potential business impact
  • Focus remediation efforts and track progress to show a measurable reduction of risk
  • Make vulnerability management an essential part of daily change management processes


This webcast will include case studies, survey data, and best practices – ideal for IT security practitioners who are considering, or already implementing, next-generation vulnerability management to effectively and measurably mitigate risk.

Register Now.

Already a member? Login