Vulnerability Management: Why a Risk-Based Approach is Essential

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Amid growing reliance on digital systems, security vulnerabilities are an inevitable and regular occurrence for organizations. In this landscape, security teams must prioritize remediations based on the highest risks posed, rather than wasting time and resources on vulnerabilities that pose little threat.

This is enabled by a risk-based approach to vulnerability management, which provides an understanding of the threat context to the business. In this webinar, a panel of expert speakers will discuss the modern vulnerability landscape and how to develop a risk-based strategy that allows your organization to quickly pivot to protect its most important assets.

Sign up to learn:

  • The evolution of the vulnerability landscape and why a risk-based model is essential
  • How you can bridge the gap between vulnerability identification and resource availability for remediation
  • How to make informed decision-making through categorization of findings and pinpointing critical vulnerabilities in your networks and cloud hosting

Speakers

Photo of Stuart Beattie

Stuart Beattie

Product Marketing, Outpost24

Photo of James Coker

James Coker

Deputy Editor, Infosecurity Magazine

Photo of Lee Munson

Lee Munson

Principal Research Analyst, Information Security Forum

Photo of John Stock

John Stock

Director of Product Management, Outpost24

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for Outpost24 here: https://outpost24.com/legal/website-terms-of-use. Please see Infosecurity Magazine’s privacy policy for more information.