The Four Stages to a Successful Vulnerability Management Program
Have you ever been around someone who is just better at something than you are? Like when you were in grade school and there was this person who was effortless at doing things correctly, like getting high grades? They had great study habits, they arrived on time, they were prepared and confident in the materials that they studied in class, and they were a consistently high performer at every stage?
What about golf? I remember reading a book called “The Big Miss” by Hank Haney. He talked about nine specific tee shots that Tiger Woods hit: three from the right side of the tee box, three on the left side, and three in the middle. High, medium, and low for each shot. And then he went through the other areas of Tiger’s game, like how the thunderclap of Tiger hitting the ball was nothing like he had ever heard of in his life. He also stated by being so well-practiced, Tiger minimized his misses even under the highest level of pressure.
All of this occurs in the same vein as that in which we are trying to minimize risk in our vulnerability management programs. Those frameworks with the most resilience are ones that are able to minimize risk over the long-term.
But how does this relate to building out a vulnerability management program that helps you successfully manage risk in your company?
Just like there is a process to hitting golf balls, there is a process to building out a successful vulnerability management program as well as a secure change management program. Tripwire is here to help.
There are four main stages of any effective vulnerability management program:
- The discovery and inventory of assets on the network – You’ve got to understand what you have in your (Read more...)
*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Mitch Parker. Read the original post at: https://www.tripwire.com/state-of-security/vulnerability-management/4-stages-successful-vulnerability-management-program/