Five ways to simplify the vulnerability management lifecycle
This presentation by Scott Sidel, CISSP, Senior Security Manager, Computer Sciences
Corporation, was given at Information Security Decisions
Vulnerability management is all about triage.
So how do you quickly and accurately quantify your
exposure, communicate that exposure and deploy resources to remediate? (Hint: You can't do it
alone.) A coalition of trusted stakeholders all working from the same set of decision criteria --
and with a unified process -- is the only way to effectively manage and mitigate today's threats in
large organizations. Now you can find out the five most effective strategies for building
vulnerability management frameworks in this comprehensive conference session presented by Scott
Sidel, CISSP, Senior Security Manager, Computer Sciences Corporation.
View the presentation
Visit our vulnerability
management resource center
This was first published in May 2005
Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.