Threat-Centric Vulnerability Management - A Security Insights-based Approach

Date: Tuesday, August 25th at 11am PDT / 2pm EDT

Vulnerability management as a standard security practice is traditionally viewed through the lens of IT operations. Its focus is most often limited to IT hygiene activities such as patching, credential management and configuration management. This limits the scope -and impact -of most vulnerability management solutions.

In order to extend risk reduction value and effectiveness, organizations should look at vulnerability management as an extension of threat and security operations. Enhancing vulnerability scans with security expertise and threat intelligence provides insights which elevate the impact that vulnerability management solutions can deliver. Integration with SIEM insights enables more proactive risk reduction and strategic insight into your environment.

In this webinar we will discuss:

  • The traditional approach of traditional vulnerability management and its limitations
  • The benefits of enhancing vulnerability management with security insights and threat management
  • The extended value when integrated with SIEM capabilities

Register now!

About the presenters:

Chris White , Global Head of Client Solutions and Chief Security Officer, BlueVoyant

Chris joined BlueVoyant with a decade of experience consulting to Fortune 500 and US Intelligence Community organizations. Prior to joining BlueVoyant, Chris was Booz Allen's Chief Engineer for Commercial Cyber Engineering Services and Data Protection Solutions. Chris holds both a B.S. in Mathematics and a B.S. in Management Science from MIT, as well as a Masters in Computational Mathematics from Johns Hopkins.

Sadiq Khan , Chief Information Security Officer, BlueVoyant

Sadiq is responsible for managing and maturing a holistic cybersecurity program that enables the organization to detect and remediate imminent threats, while proactively building a best-in-class security architecture. BlueVoyant is committed to designing our defenses based on zero-trust principles.

Your e-mail address is used to communicate with you about your registration, related products and services, and offers from select vendors. Refer to our Privacy Policy for additional information.