3.1 Considering Your Options for Vulnerability - VM

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
1 hour 23 minutes
Difficulty
Beginner
CEU/CPE
2
Video Transcription
00:01
in the last video, we talked about performing additional vulnerability scans to verify that patches to systems are working.
00:08
And this video we're going to talk about the best path to eliminate network vulnerabilities
00:15
for learning objectives. We're gonna talk about eliminating network vulnerabilities,
00:21
stipulate a pre assessment
00:24
vulnerability. Management is not an important port of protecting and organizations asset
00:30
is that true or foes?
00:36
This is folks. Vulnerability Management is actually a critical component of protecting and organizations assets.
00:44
I left the opportunity eliminating network of on network going abilities.
00:49
So we're gonna cover choice
00:52
automation
00:53
technology
00:55
and lastly scalability.
00:59
So look at choice was first,
01:00
The choice you make for eliminating network vulnerabilities can have an impact on your compliance.
01:07
You want the two solutions that provide accurate reporting
01:11
and that meet the criteria of regulatory bodies.
01:15
Depending on your industry, you may have several regulations or stand that your organization has to follow,
01:21
like Sarbanes actually act in the financial industry
01:25
Hippo in the healthcare industry or PC I, the SS
01:30
indie credit card in this room.
01:34
Look at automation.
01:36
We want to automate our vulnerability and management as much as possible.
01:41
The main reasons for doing this or to save us time
01:45
using our resource that could be better dedicated elsewhere.
01:49
And automation may allow us to have better compliance,
01:53
since we would need to dedicate. Resource is if we were doing manual vulnerability management
01:59
that would also lead to a higher costs for the company.
02:04
Automation also reduces the likelihood of human error.
02:09
Let's look into technology
02:12
well, considering the tools you were used for eliminating network vulnerabilities, it is important to remember that you don't want to skimp on the technology
02:22
meaning
02:23
Don't be cheap.
02:24
You want to make sure you're chosen technology solution will show you meaningful data and will help the organization maintain compliance.
02:35
Now, not every tool is the same, and you also want to make sure you're using tools that are deemed safe across the industry.
02:46
Remember,
02:46
the tool is going to be scanning your network and looking that confidential data.
02:52
Do you really want to trust that random to you? Found any Google search?
02:57
Or would you rather use the same two as larger organizations across industry,
03:04
Remember,
03:05
is better to be safe than sorry.
03:09
Now let's look at scalability.
03:13
Any vulnerability, magical solution
03:15
that you need
03:16
uses the scalability
03:21
or basically has the needs for scalability for your organization.
03:25
So things like being able to support the growth of users on IT network and any increased complexity in the network architect.
03:35
The Vulnerability Mansion solution needs to be cost effective at scale, and the pay structure should be teared based off the numbers of users.
03:46
Now let's look at our pools Assessment
03:50
without vulnerability. Mansion solution.
03:53
We should focus solely on calls and not worry about the tools
03:57
our industry
03:59
of our industry standards.
04:00
Is this true
04:02
or is this false?
04:10
This is folks. Remember, we talked about the importance of using vulnerability management tools that are safe
04:16
while Coast is important. It should be the sole factor in determining the best vulnerability and management solution to use
04:28
case. And now we reached our summer.
04:30
It's okay, and it's really you. We talked about eliminating network vulnerabilities
04:35
and the things that we need to consider and making better choices above one ability management.
04:43
In the next video, we'll talk about the use of consultants and vulnerability management
Up Next
Fundamentals of Vulnerability Management

Most of the successful attacks through a business network could be prevented with vulnerability management. This course focuses on what you can do to automatically manage vulnerabilities and keep your network safe from attack.

Instructed By