ISMG’s Virtual Roundtables focus on specific challenges being faced by information security executives in today’s cybersecurity landscape. Moderated by one of ISMG’s Executive Editors and a guest industry expert, Virtual Roundtables give cybersecurity professionals the opportunity to discuss threats and controls with a handful of market leaders in an informal and online setting, from which you will emerge with new ideas and solutions you can immediately put to work to improve your own organization’s defensive posture.
Inverting the Vulnerability Management Pyramid
Nick Holland – Executive Editor, ISMG / Michael Roytman – Chief Data Scientist, Kenna Security
The traditional view of vulnerability management is a pyramid model. At the base you have sensors and scanners with security tools that gather data via your environment. On top of that you layer threat intelligence which prioritizes or filters some of that data, and on top of that is the pinnacle of the pyramid – action taken.
What if you need the decisions and actions, not knowing anything about your environment? What are the tools you would use to reinforce that decision? What would be the benefits of such a system?
Please join ISMG’s Nick Holland for an exclusive Virtual Roundtable that will draw from the experiences of the attendees, offering thoughts on the future of vulnerability management.
Discussion topics will include:
- What is the state of vulnerability management today?
- How can we move to a more proactive system of alerts?
- What would an inverted vulnerability scan pyramid look like in practice?
- What are the tools and technologies needed to transition to next generation vulnerability management?
Joining Nick to provide expert insight and case studies is Michael Roytman, Chief Data Scientist at Kenna Security.
Date: Wednesday, November 4th, 2020
Time: 4:00 PM – 5:30 PM ET
Moderator: Nick Holland
About the Sponsor
Kenna Security is a software-as-a-service Risk and Vulnerability Intelligence platform that accurately measures risk and prioritizes remediation efforts before an attacker can exploit an organization’s weaknesses. Kenna automates the correlation of vulnerability data, threat data, and 0-day data, analyzing security vulnerabilities against active Internet breaches so that InfoSec teams can prioritize remediations and report on their overall risk posture. For more information, visit kennasecurity.com.