How to hone an effective vulnerability management program
A comprehensive collection of articles, videos and more, hand-picked by our editors
When it comes to corporate security vulnerability assessments, there's no such thing as a cookie-cutter approach. Simply going through the motions by running -- and relying on -- basic vulnerability scans on your most seemingly critical systems won't identify all vulnerability, and almost certainly will miss the most important ones. Businesses spend so much time, money and effort seeking to check off that box to please regulators, business partners or customers, yet security breaches haunt us like never before. The default approach, the one most assessments follow, is broken.
In this webcast, Kevin Beaver, information security expert and author of the highly successful book Hacking For Dummies, now in its fourth edition, will share his real-world experiences with security vulnerability assessments -- what he has learned and mistakes he has made -- so you can understand what it takes to elevate your network and application security vulnerability testing to the levels they need to be.
About the expert:
Kevin Beaver, CISSP, is an independent information security consultant, speaker and expert witness with Atlanta-based Principle Logic LLC. He has over 20 years of experience in the industry and specializes in performing independent information security and compliance assessments revolving around information risk management. Kevin has authored or co-authored seven books on information security, including the ethical hacking books Hacking For Dummies and Hacking Wireless Networks For Dummies (Wiley) and The Practical Guide to HIPAA Privacy and Security Compliance (Auerbach). He's also the creator of the Security On Wheels information security audio books and blog, providing security learning for IT professionals on the go. Kevin can be reached at www.principlelogic.com.