Design and Implement a Vulnerability Management Program
If you're already a member, click here to log in.
Major Business Pain Points
Recommendations
Key Points
Approach
Methodology and Tools
Executive Brief
Read the concise Executive Brief to find out why you should design and implement a vulnerability management program and review the methodology.
1. Identify vulnerability sources
Begin the project by creating a vulnerability management team and determine how vulnerabilities will be identified through scanners, penetration tests, third-party sources, and incidents.
2. Triage vulnerabilities and assign urgencies
Determine how vulnerabilities will be triaged and evaluated based on intrinsic qualities and how they may compromise business functions and data sensitivity.
3. Remediate vulnerabilities
Develop a process to remediate vulnerabilities, including the identification of the appropriate remediation option.
4. Continually improve the vulnerability management process
Evolve the program continually by developing metrics and formalizing a policy.
All resources on this page are provided to Cyber Leadership Hub members under license from third parties including Info-Tech Research Group Inc, a global leader in providing IT research and advice.