Vulnerability Management Best Practices: What You Need to Know

Andrea-Pezzotti

 

Date: October 28th, 2021
Time: 4:00PM CET / 7:30PM IST / 7:00AM PST
Topic: Vulnerability Management Best Practices: What You Need to Know

Watch Now

Abstract:

Vulnerability management is defined as the “cyclical practice of identifying, classifying, prioritizing, remediating, and mitigating” software vulnerabilities. Vulnerability management programs run successfully with structured processes implemented continuously through global best practices. Join us to learn best practices and the standard frameworks to efficiently implement a vulnerability management process to protect your assets from cyber risks.

Key takeaways:

  1. Enhance the visibility for vulnerability detection
  2. Vulnerability management to threat and technical risks: the process chain
  3. Types of attackers and their attack methods
  4. Industry frameworks: MITRE ATT&CK and Cyber Kill Chain

Speaker:

Andrea PezzottiAndrea Pezzotti, Global Head Vulnerability Management and Technical Risks at Novartis

Bio: “Andrea is approaching two decades as an IT/Security Leader, he has worked in multiple countries across Europe leading Security, Architecture and Project/Service Management global teams with focus on Telecommunication, Banking and Healthcare industries. His most recent core capabilities are in Cyber Defense: threat and vulnerability management, from strategy to implementation to blue team operations. Additionally, he is adept at Red Team management: pen test and adversary simulations, entry-point identification, and security hygiene baseline of both cloud and on-prem assets. During the recent pandemic he gave a primary importance to build up a properly skilled, diverse and inclusive remote workplace.”

*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)


Share this post

Recent Posts

INQUIRE NOW

Related Posts

Are you looking to pursue a career in cybersecurity?

Unlock Your Cyber Security Potential at EC-Council University