Implementing a Vulnerability Management Process (original) (raw)

Download File

Implementing a Vulnerability Management Process (PDF, 2.36MB)Published: 09 Apr, 2013

This paper looks at how a vulnerability management (VM) process could be designed and implemented within an organization. Articles and studies about VM usually focus mainly on the technology aspects of vulnerability scanning. The goal of this study is to call attention to something that is often overlooked: a basic VM process which could be easily adapted and implemented in any part of the organization.

Additional resources

LDR433: Managing Human Risk

LDR433Cybersecurity Leadership
LDR433: Managing Human Risk

SEC402: Cybersecurity Writing: Hack the Reader

SEC402Cybersecurity Leadership
SEC403

LDR512: Security Leadership Essentials for Managers

LDR512Cybersecurity Leadership
LDR512: Security Leadership Essentials for Managers

LDR551: Building and Leading Security Operations Centers

LDR551Cybersecurity Leadership
LDR551: Building and Leading Security Operations Centers

LDR519: Cybersecurity Risk Management and Compliance

LDR519Cybersecurity Leadership
LDR519: Cybersecurity Risk Management and Compliance

LDR516: Strategic Vulnerability and Threat Management

LDR516Cybersecurity Leadership
LDR516: Building and Leading Vulnerability Management Programs

LDR521: Security Culture for Leaders

LDR521Cybersecurity Leadership
LDR521: Security Culture for Leaders

AIS247: AI Security Essentials for Business Leaders

AIS247Cybersecurity Leadership
LDR414: SANS Training Program for CISSP® Certification

LDR553: Cyber Incident Management

LDR553Cybersecurity Leadership
LDR553: Cyber Incident Management

LDR514: Security Strategic Planning, Policy, and Leadership

LDR514Cybersecurity Leadership
LDR514: Security Strategic Planning, Policy, and Leadership

SEC566: Implementing and Auditing CIS Controls

SEC566Cybersecurity Leadership
SEC566: Implementing and Auditing CIS Controls

LDR520: Cloud Security for Leaders

LDR520Cybersecurity Leadership
LDR520: Cloud Security for Leaders

SEC403: Secrets to Successful Cybersecurity Presentation

SEC403Cybersecurity Leadership
SEC403

LDR414: SANS Training Program for CISSP® Certification

LDR414Cybersecurity Leadership
LDR414: SANS Training Program for CISSP® Certification

LDR419: Performing A Cybersecurity Risk Assessment

LDR419Cybersecurity Leadership
LDR419: Performing A Cybersecurity Risk Assessment