Maria Varmazis

Done with Vulnerability Management 101? Build an advanced risk management program

Blog Post created by Maria Varmazis Employee on May 28, 2014

Nobody wants to be part of a team that just chugs along, sight unseen until The Next Big Crisis hits—advanced security teams know how to provide true business value every day, and they have the results to prove it, too.


These security teams know that the key to their success is not playing whack-a-mole with whatever vulnerabilities they have time to address, but rather they take a step back and look at the whole business for context and cues. Not all assets are equally important to a business--and while you know this, the tools in your security arsenal might not. By prioritizing risks according to issues and assets that actually matter to your business (servers storing customer PII versus servers storing intranet photos), and not just by things like CVSS scores or other scoring methods -- you can help ensure your team doesn't waste time or accidentally neglecting a critical configuration issue or vulnerability.


Well, it all sounds logical enough. But how do you get there? How do you evolve your risk management program? 670px-Evolve-in-Pokemon-Red-Rescue-Team-Step-8.jpg


We've put together a framework to help guide you through making this happen in our newest eBook: Find the True Risks: Building an Advanced Security Risk Management Program.


This eBook has tips to help you establish security practices to better prioritize contextualize risks, as well as methods and metrics to track and (more importantly) prove your success to key stakeholders. If you're thinking about how to make your security practices more effective and efficient, definitely give this eBook a read.


Download the eBook here: Find the True Risks: Building an Advanced Security Risk Management Program


Let me know what you think -- how has your security team handled risk prioritization? What's working for you? (What's not working?)


- Maria