Archived Webinar: Threat Driven Vulnerability Prioritization 

 

Thursday, 10 August 2017
12 pm (EDT) / 11 am (CDT) / 9 am (PDT) / 16:00 (UTC)
60 minutes
1 CPE (Members only)


Security teams are overwhelmed by the number of vulnerabilities in their environments: every day they are finding more than they can fix. How do you know where to focus if you have 10,000+ vulnerabilities with a critical or high severity rating? And when a high-profile vulnerability comes along, how do you quickly gain insight into its impact on your organization? Understanding which vulnerabilities are most likely to be exploited by an attacker is critical for effective prioritization. This webinar will discuss the need for vulnerability-based threat intelligence and how to incorporate it into your security program that adds real value and not just noise.

Jane Man,
Senior Product Manager,
Rapid 7

As a Senior Product Manager for Rapid7’s Vulnerability Management offerings, Jane works closely with customers, engineering, and user experience teams to shape and deliver innovative security solutions. Prior to joining Rapid7, Jane worked in Product Marketing roles across Asia Pacific, and holds Bachelor degrees in Electrical & Computer Engineering and Commerce & Administration.

Tom Sellers,
Security Researcher,
Rapid 7

Tom, CISA, is a Security Researcher on the Rapid7 Labs team where he works with projects such as Sonar and Heisenberg. He has over 20 years’ experience in IT and Security. Tom has been responsible for defensive Information Security for companies in the finance, service provider, and security software industries. He's contributed to Nmap since 2007 as well as created multiple modules for the Metasploit Project.