Главная
Study mode:
on
1
Intro
2
Disclaimer
3
Prerequisites
4
Common Problems
5
Patching Approach
6
Discovery
7
Things to avoid
8
Discovery sweeps
9
Vulnerability scanning
10
Authentication vs Unauthenticated
11
Risk Management
12
Reporting
13
Automation
14
Web App Scanning
15
Cloud Scanning
16
Code Integration
17
Agents
Description:
Explore a comprehensive conference talk on threat and vulnerability management (TVM) that identifies critical aspects often overlooked in the TVM lifecycle. Learn about best practices for architecting deployments, building operational tasks, aligning reporting with business processes, communicating vulnerabilities and risk to stakeholders, and adding automation. Discover common problems in TVM implementations and how to avoid them, including proper patching approaches, discovery methods, vulnerability scanning techniques, and risk management strategies. Gain insights into effective reporting, automation, web application scanning, cloud scanning, and code integration. Whether you're involved in day-to-day TVM operations or architecting new installations, acquire valuable knowledge to improve your organization's vulnerability management practices and align them with business requirements.

Vulnerability Management Best Practices and Common Pitfalls

LASCON
Add to list
0:00 / 0:00