Sept. 9, 2021 | 10:00 - 11:00 AM CDT
The traditional view of vulnerability management is a pyramid model. At the base you have sensors and scanners with security tools that gather data via your environment. On top of that you layer threat intelligence which prioritizes or filters some of that data, and on top of that is the pinnacle of the pyramid â?" action taken.
What if you need the decisions and actions, not knowing anything about your environment? What are the tools you would use to reinforce that decision? What would be the benefits of such a system? Please join ISMG's Scott Ferguson for an exclusive Virtual Roundtable that will draw from the experiences of the attendees, offering thoughts on the future of vulnerability management..
Discussion topics will include:.
Joining Scott to provide expert insight and case studies is Michael Roytman, Chief Data Scientist at Kenna Security.