Overview
Threat, Vulnerability, and Attack Surface Management

How do we effectively connect our threat and vulnerability management programs with our actual attack surface?

Security Controls Covered: Threat Detection, Threat Management, Threat Intelligence, Threat Hunting, Vulnerability Management, MDR, XDR, EDR, Network Security, Incident Response, SIEM, SOAR, UEBA, Pen Testing, Attack/Breach Simulation, and Deception

Managing the risk to systems and data starts with knowing our vulnerabilities, understanding the threats to those vulnerabilities, putting a value on our assets, and then putting in place controls to mitigate risk based on our attack surface. The connection between our threat management and vulnerability management programs with visibility into our attack surface seems to be the next step in the evolution of overall protection against threats.

In this series we will explore the latest techniques and best practices for managing threats, vulnerabilities, and attack surface including cross-organizational participation.

Sponsored by Okta, IBM, Skybox Security