Boston, November 13, 2019 –Cybersecurity vulnerability management is the art of identifying, remediating, or mitigating risks posed by hardware and software across an enterprise. Effective vulnerability management includes measurement, process improvement, and timely reporting to allow an organization to regularly assess cyber risk as part of overall enterprise risk. Can chief information security officers and their teams enhance their vulnerability management efforts through asset prioritization, accountability, process improvement, and automation?
This report examines the essential components of an effective vulnerability management program, provides some suggestions on how programs can be enhanced, and examines some methods (and tricks) to address today’s challenges in the vulnerability management process. It is based on the author’s experience building and managing vulnerability management programs at Global 1000 companies as well as assessing and auditing programs at dozens of Fortune 500 and Global 100 companies.
This 20-page Impact Report contains one figure and one table. Clients of Aite Group’s Cybersecurity service can download this report, the corresponding charts, and the Executive Impact Deck.
This report mentions BMC Helix, CA Technologies (Broadcom), Denim Group, Equifax, IBM, iDefense (Accenture), Micro Focus, Qualys, Rapid7, ServiceNow, Symantec, and Tenable.