Most security leaders recognise that scanning for vulnerabilities should be a vital part of their security program.
But running a vulnerability scan is just the tip of the iceberg. Ever wondered what you should be scanning in your environment, or how often you should be scheduling scans? And how do you validate, prioritise and remediate scan results?
All these critical activities work in tandem and underlie an effective and repeatable vulnerability management program.
What you’ll learn
Join us for actionable tips on how to establish and run a vulnerability management program that works for you.
You will learn how to:
Establish a vulnerability management strategy
Follow vulnerability management best practices
Get the right tools, resources, and processes in place
Feed vulnerability data into other tools for deeper intelligence
Report and get the right information to the right people
CTO – Shearwater Solutions
Mark Hofman is the Chief Technology Officer at Shearwater Solutions and has over 15 years’ experience in ICT Security. He has worked for both private industry and government and has provided a wide range of information security consulting services to numerous organisations, including the financial sector, private sector, and government organisations.
Mark is currently a certified instructor for the SANS Institute. He has had a number of publications, has trained and lectured internationally, and is a handler for the Internet Storm Center. Mark holds professional certifications, including CISSP, GIAC GCFW, CompTIA Security+ and BSI lead auditor accreditations.
Register for the Webinar
The live webinar has concluded, please register if you would like to view the recording.