default Stage Background

Vulnerability management:Holistic strategies for minimising attack surfaces

Vulnerability management for comprehensive protection: from attack path analysis to identity checks. Get to know new strategies.

Topic

Cloud SecurityLegislation, standards, regulationsGovernance, Riskmanagement and ComplianceIdentity and access managementNetwork Security / Patch Management

When & Where

calendar_month

Wed, 10/23/2024, 13:15 - 13:30

location_on

Forum, Booth 9-103

Download session as iCaldownload_for_offline

Details

  • Format:

    Management lecture

Session description

In our lecture “Vulnerability Management: Holistic Strategies for Minimizing Attack Surfaces” we offer you a comprehensive overview of modern approaches to vulnerability management. Traditional methods are often no longer sufficient to address the growing threats in today's digital landscape. We therefore present the concept of vulnerability management 2.0, which impresses with its holistic perspective and the integration of advanced security strategies.
Find out how vulnerability management has developed from its beginnings to today. We begin with a historical review and demonstrate the transition from reactive to proactive security measures.
Core components of vulnerability management 2.0:
Attack Surface Management (ASM): Learn how to identify and manage ...

Speaker

Moderator