As a Cybersecurity professional you spend a lot of time on the persistent threats, but this doesn’t always connect with how hackers follow the path of least resistance. Because security vulnerabilities always exist until they are patched it is only by incorporating asset management, patch management, and vulnerability management that you can ensure accountability and truly harden your organization.
- How to determine the “other” devices on your network you’re probably forgetting
- The ways that risk scores can blind you to the true threats
- How to properly maintain an asset inventory
- The 5 elements that should be included in your formal process
Technical Level: High