Implementing an Effective Vulnerability Management Program
Brian Honan presents this webinar on how to develop and implement an effective vulnerability management program as part of a wider security strategy. A best practice guide on how to identify your most critical assets, protect your data and reduce the breach to detection gap
Brian Honan is a leading security expert with over 25 year experience in the industry and is regularly asked to speak at various information security conferences internationally. Brian is Certified Information Security Manager (CISM), Certified in Risk and Information Systems Control (CRISC) and Certified in the Governance of Enterprise IT (CGEIT) by the Information Systems Audit and Control Association.
Brian’s skills and expertise were recognised when he was awarded the prestigious SC Magazine Award for Information Security Person of the Year 2013. Brian extensive experience in managing and delivering projects coupled with his technical expertise places him in an extremely credible position to advise on such information security topics.
As information is fast becoming the most valuable asset to organisations so is the attractiveness to cyber criminals and hackers to try and gain access. Implementing an effective security program is paramount to reducing the risk of an attack, protecting your data and minimising the breach to detection gap but where do you start?
This webinar outlines how to develop and integrate a comprehensive vulnerability management program as part of an overall information security program, based on identifying vulnerabilities in various aspects of an organisation’s security infrastructure, not just technical vulnerabilities but the human and other elements too. It also recommends best practices processes such as change management, incident response and risk management with the all-important key performance indicators that you should measure.