1.2.2 Understanding the Need for Vulnerability Management Part 2 - VM

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
1 hour 23 minutes
Difficulty
Beginner
CEU/CPE
2
Video Transcription
00:00
now to address these new security threats
00:03
we have patching
00:05
and which patching is a remedy.
00:08
We have the ideas and I PS, which one basically detects,
00:14
did threat. That's on a network
00:17
another one actually stops through. So the
00:21
intrusion detection detects
00:23
intrusion. Protection stops
00:27
with the anti male were solution
00:29
which, as we just spoke about,
00:31
falls with McAfee and Symantec,
00:34
where detects and it also stops
00:38
and eliminates any sort of male wear viruses.
00:42
It's all in your system.
00:45
Then we have the trends as well, too. So
00:48
with the trends with the trends, addresses
00:51
basically takes a snapshot
00:54
of all vulnerabilities and all attacks
00:57
that works,
00:59
Tried or basically
01:00
that were given to your computer.
01:04
There's its signature. Dead identifies
01:07
your behavior
01:10
in which the trends justice to howto tex or given or basically heart attacks are carried out.
01:17
Bodies, Attackers.
01:22
So Mantan compliance.
01:25
So we have hipper.
01:26
Would you dress It? Is how care
01:30
we have sacks,
01:30
which is commercial sat
01:34
with G L. B.
01:37
We just commercial as well, too,
01:38
with PC I, which is really huge in the financial sector, so that deals with any sort of financial
01:47
financial pieces. For its credit cards, bank accounts
01:49
and we have a GDP are as well, too.
01:53
So GDP are also could be found
01:56
in the commercial sector
01:57
and at times, government sector.
02:00
Now the important pieces for us, well, compliance
02:05
just to make sure that all
02:07
security events are basically security controls
02:12
or carried out correctly.
02:14
So, for instance,
02:15
if it's security control calls for
02:20
patches to be applied every week,
02:23
this entity needs to follow
02:27
this particular piece of compliance. So, for instance, of hip hop
02:30
Hey,
02:31
you need to patch every week
02:35
and it's part of that HIPPA
02:37
stand there. Basically, it is compliance.
02:39
You two patch over a week
02:40
and it also protects
02:43
against person information are basically P I,
02:46
which is personal. Identifiable information,
02:52
safeguards it against any attack.
02:59
So what are the challenges?
03:00
Okay, so the first challenge is a lack of resources.
03:04
We have more problems than people.
03:07
We have the move imports,
03:09
so the move imports are
03:12
of grades and a new technology.
03:15
It's constantly moving. I teach is not censored
03:19
and finally we have to stay hold to buy.
03:23
So we have stakeholders that's at the top, or basically the people who own the company
03:29
only these particular systems,
03:30
they have to buy it.
03:32
They have to know. Why am I? Why am I spending this money
03:37
on its software? You have to convince him. So in orderto get him to buy again, you have to go events on the body.
03:46
It's a solution.
03:47
The solution here is automation.
03:51
Automation takes care of the issue of having a lack of resource is.
03:55
So when you automate basically have your scanning system going
04:01
any schedule
04:04
and it's scheduled time,
04:08
it actually helps. As far as with the workforce,
04:11
it pleased the port as a worker.
04:15
That's not really a WR.
04:16
Automation is key.
04:19
So, by inference, take key stakeholders.
04:23
These guys are the decision makers.
04:25
You need to get buying from these guys in order to be successful.
04:28
These are the guys will spend the money
04:30
to get the new tools. I will get the two that's needed to protect the environment.
04:36
Let's look at the post assessment
04:40
Companies should use automation toe better combat foreign abilities.
04:45
Is it a
04:46
true
04:47
or is it be false?
04:51
His answer is true.
04:53
A
04:57
Now in this video, we wrapped up on our discussion on why we need vulnerability management by talking about identifying and fixing folks
05:04
in the next video, we'll start our discussion on actually doing vulnerability management.
Up Next
Fundamentals of Vulnerability Management

Most of the successful attacks through a business network could be prevented with vulnerability management. This course focuses on what you can do to automatically manage vulnerabilities and keep your network safe from attack.

Instructed By