Time
1 hour 23 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:00
now to address these new security threats
00:03
we have patching
00:05
and which patching is a remedy.
00:08
We have the ideas and I PS, which one basically detects,
00:14
did threat. That's on a network
00:17
another one actually stops through. So the
00:21
intrusion detection detects
00:23
intrusion. Protection stops
00:27
with the anti male were solution
00:29
which, as we just spoke about,
00:31
falls with McAfee and Symantec,
00:34
where detects and it also stops
00:38
and eliminates any sort of male wear viruses.
00:42
It's all in your system.
00:45
Then we have the trends as well, too. So
00:48
with the trends with the trends, addresses
00:51
basically takes a snapshot
00:54
of all vulnerabilities and all attacks
00:57
that works,
00:59
Tried or basically
01:00
that were given to your computer.
01:04
There's its signature. Dead identifies
01:07
your behavior
01:10
in which the trends justice to howto tex or given or basically heart attacks are carried out.
01:17
Bodies, Attackers.
01:22
So Mantan compliance.
01:25
So we have hipper.
01:26
Would you dress It? Is how care
01:30
we have sacks,
01:30
which is commercial sat
01:34
with G L. B.
01:37
We just commercial as well, too,
01:38
with PC I, which is really huge in the financial sector, so that deals with any sort of financial
01:47
financial pieces. For its credit cards, bank accounts
01:49
and we have a GDP are as well, too.
01:53
So GDP are also could be found
01:56
in the commercial sector
01:57
and at times, government sector.
02:00
Now the important pieces for us, well, compliance
02:05
just to make sure that all
02:07
security events are basically security controls
02:12
or carried out correctly.
02:14
So, for instance,
02:15
if it's security control calls for
02:20
patches to be applied every week,
02:23
this entity needs to follow
02:27
this particular piece of compliance. So, for instance, of hip hop
02:30
Hey,
02:31
you need to patch every week
02:35
and it's part of that HIPPA
02:37
stand there. Basically, it is compliance.
02:39
You two patch over a week
02:40
and it also protects
02:43
against person information are basically P I,
02:46
which is personal. Identifiable information,
02:52
safeguards it against any attack.
02:59
So what are the challenges?
03:00
Okay, so the first challenge is a lack of resources.
03:04
We have more problems than people.
03:07
We have the move imports,
03:09
so the move imports are
03:12
of grades and a new technology.
03:15
It's constantly moving. I teach is not censored
03:19
and finally we have to stay hold to buy.
03:23
So we have stakeholders that's at the top, or basically the people who own the company
03:29
only these particular systems,
03:30
they have to buy it.
03:32
They have to know. Why am I? Why am I spending this money
03:37
on its software? You have to convince him. So in orderto get him to buy again, you have to go events on the body.
03:46
It's a solution.
03:47
The solution here is automation.
03:51
Automation takes care of the issue of having a lack of resource is.
03:55
So when you automate basically have your scanning system going
04:01
any schedule
04:04
and it's scheduled time,
04:08
it actually helps. As far as with the workforce,
04:11
it pleased the port as a worker.
04:15
That's not really a WR.
04:16
Automation is key.
04:19
So, by inference, take key stakeholders.
04:23
These guys are the decision makers.
04:25
You need to get buying from these guys in order to be successful.
04:28
These are the guys will spend the money
04:30
to get the new tools. I will get the two that's needed to protect the environment.
04:36
Let's look at the post assessment
04:40
Companies should use automation toe better combat foreign abilities.
04:45
Is it a
04:46
true
04:47
or is it be false?
04:51
His answer is true.
04:53
A
04:57
Now in this video, we wrapped up on our discussion on why we need vulnerability management by talking about identifying and fixing folks
05:04
in the next video, we'll start our discussion on actually doing vulnerability management.

Up Next

Fundamentals of Vulnerability Management

Most of the successful attacks through a business network could be prevented with vulnerability management. This course focuses on what you can do to automatically manage vulnerabilities and keep your network safe from attack.

Instructed By

Instructor Profile Image
Corey Charles
Founder of DreamVision IT LLC
Instructor