Report

Vulnerability Management: Take Your Program to the Next Level

Vulnerability management requires a long-term and constant approach to limit risk to the organization.
/

Boston, November 13, 2019 – Cybersecurity vulnerability management is the art of identifying, remediating, or mitigating risks posed by hardware and software across an enterprise. Effective vulnerability management includes measurement, process improvement, and timely reporting to allow an organization to regularly assess cyber risk as part of overall enterprise risk. Can chief information security officers and their teams enhance their vulnerability management efforts through asset prioritization, accountability, process improvement, and automation?  

This report examines the essential components of an effective vulnerability management program, provides some suggestions on how programs can be enhanced, and examines some methods (and tricks) to address today’s challenges in the vulnerability management process. It is based on the author’s experience building and managing vulnerability management programs at Global 1000 companies as well as assessing and auditing programs at dozens of Fortune 500 and Global 100 companies.

This 20-page Impact Report contains one figure and one table. Clients of Aite Group’s Cybersecurity service can download this report, the corresponding charts, and the Executive Impact Deck.

This report mentions BMC Helix, CA Technologies (Broadcom), Denim Group, Equifax, IBM, iDefense (Accenture), Micro Focus, Qualys, Rapid7, ServiceNow, Symantec, and Tenable.

Related Content

In Plain Sight II: On the Trail of Magecart

An effort to understand how e-commerce sites are at risk revealed 80 e-commerce sites actively sending credit card numbers to offsite servers.

Get Summary Report

"*" indicates required fields

Name*
This field is for validation purposes and should be left unchanged.