Session
Navigating the Challenges of Risk-Based Vulnerability Management in a Cloud-Native World
2015 to today we changed the way we build things...containerized environments, and modern software development practices has redefined the landscape of cybersecurity. With this shift, vulnerability management faces unprecedented challenges in terms of scale, complexity, and data consistency. In this presentation, two leading experts delve into the intricacies of adopting a risk-based approach to vulnerability management, focusing on practical strategies and emerging methodologies in the enterprise.
### Key Topics:
- **The Inconsistency of Data**: Fragmented and siloed security data often hampers efforts to prioritize vulnerabilities effectively. The presentation explores strategies to consolidate and normalize data from disparate tools and environments, enabling a unified view that supports informed decision-making.
- **Vulnerability Management at Scale**: Managing vulnerabilities in sprawling, dynamic infrastructures demands innovative approaches. The speakers share insights into automating prioritization and remediation workflows, addressing the unique challenges of containerized and server-less architectures.
- **Reachability Analysis**: Identifying exploitable vulnerabilities through reachability analysis has emerged as a game-changer. The panel discusses how contextualizing vulnerabilities within the software supply chain and runtime environments can help organizations focus their resources on the most critical risks.
### Learning Objectives:
Attendees will gain a deeper understanding of:
- How to overcome the barriers posed by inconsistent data in vulnerability management workflows.
- Best practices for managing vulnerabilities across diverse and rapidly scaling environments.
- The value of incorporating reachability analysis into risk-based prioritization to reduce noise and focus on actionable threats.
This session is addressed to leaders who are looking at scaling vulnerability management in an organization, bringing code, cloud, and traditional attack paths under a single view the session has practitioner-to-practitioner use cases and stories to bring reality.
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top