Effective Vulnerabilities Management in Simple Ten Steps - PowerPoint PPT Presentation

About This Presentation
Title:

Effective Vulnerabilities Management in Simple Ten Steps

Description:

Building an effective vulnerability management program is critical to every organization, no matter the type. Businesses must understand how to effectively prevent cyber-attacks by eliminating weaknesses in their networks if they don’t want to end up on the nightly news. – PowerPoint PPT presentation

Number of Views:20

less

Transcript and Presenter's Notes

Title: Effective Vulnerabilities Management in Simple Ten Steps


1
Effective Vulnerability Management
In Simple 10 Steps
Asset Identification Management
39
of respondents say that lack visibility into
applications, underlying systems and
vulnerabilities.
PROMISEC
www.promisec.com
2
Consistent Vulnerability Management
Vulnerability Identification
of the 15,435 vulnerabilities discovered in 2014,
11 were reated "Highly Critical" and just 0.3
as "Extremely Critical"
Less Than 40
of organizations their entire network with active
vulnerability scan more than once per quarter.
PROMISEC
www.promisec.com
3
Risk Management
Change Management
of incidents can be attributed to errors by
system administrators and other internal staff.
60
Risk management are used to identity, estimate,
and prioritize risk to organizations.
PROMISEC
www.promisec.com
4
Mobile Device Management
Patch Management
of respondents believe their mobile endpoints
have been the target of malware over the past 12
months.
of the exploited vulnerabilities had been
compromised more than a year the associated
CVE(Common Vulnerabilities and Exposure) was
published.
99.9
PROMISEC
www.promisec.com
5
Mitigation Management
Secunia recorded 15,435 software vulnerabilities
in 3870 applications during 2014 a 55 increase
in the five trend an 18 increase from 2013.
PROMISEC
www.promisec.com
6
Incident Response
Automation
of respondent organizations manually remediate
infected hosts- an approach which carries with an
increased "time of exposure" and, therefore,
increased potential for data theft and other
forms of damage.
1 out of 5 Security Operations Centres are not
minimally prepared to respond to, much less
detect, cyber threats affecting their
organization.
33
PROMISEC
www.promisec.com
7
CONTACT US
Support_at_promisec.com
www.promisec.com
_at_Promisec_IT
Write a Comment
User Comments (0)
About PowerShow.com