
Vulnerability management:Holistic strategies for minimising attack surfaces
Vulnerability management for comprehensive protection: from attack path analysis to identity checks. Get to know new strategies.
Topic
Cloud SecurityLegislation, standards, regulationsGovernance, Riskmanagement and ComplianceIdentity and access managementNetwork Security / Patch Management
When & Where
Details
Format:
Management lecture
Session description
In our lecture “Vulnerability Management: Holistic Strategies for Minimizing Attack Surfaces” we offer you a comprehensive overview of modern approaches to vulnerability management. Traditional methods are often no longer sufficient to address the growing threats in today's digital landscape. We therefore present the concept of vulnerability management 2.0, which impresses with its holistic perspective and the integration of advanced security strategies.
Find out how vulnerability management has developed from its beginnings to today. We begin with a historical review and demonstrate the transition from reactive to proactive security measures.
Core components of vulnerability management 2.0:
Attack Surface Management (ASM): Learn how to identify and manage ...
Find out how vulnerability management has developed from its beginnings to today. We begin with a historical review and demonstrate the transition from reactive to proactive security measures.
Core components of vulnerability management 2.0:
Attack Surface Management (ASM): Learn how to identify and manage ...
Speaker
Moderator
