Finding Highest Priority Vulnerabilities to Work On
Veteran Security Architect Shannon Johnson walks us through successful practices in identifying and classifying assets, collaborating with asset owners to ascribe criticality, comparing against vulnerability ratings in security tools, building remediation pipelines (we call them Runbooks), and managing an orchestration tool.
Oops! Something went wrong while submitting the form.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.