Posted on
in Presentations
Building a vulnerability management program often feels like eating an elephant that’s guarded by sharks — trying to avoid being bitten while going in for a bite. This session will walk attendees through building an effective program: avoiding and mitigating common problems with people and technology, and getting the biggest bang for the buck in reducing risk.
Join the RSAC™ Membership to unlock AI-powered summaries, mind maps, and slides for this and other RSAC™ Conference presentations. Learn more.
Share With Your Community