2024 Event
Coronado Ballroom
9 am - 9:15 am, Monday, September 23
TECH SPOTLIGHT - Are Vulnerability Scanners Dead? Transcending CVEs for Vulnerability Management
About

We’ve relied on vulnerability scanners to assess our assets and generate reports containing IP addresses and their associated CVEs. CVEs add value but only represent a subset of your risk exposure. They miss critical variables such as the presence and state of endpoint IT management and security controls, making them largely obsolete when relied upon in a vacuum. 

Does it matter how many CVEs you detect if impacted devices have no remediation controls? A modern approach to vulnerability management must transcend the realm of CVEs and encompass exposures related to environmental vulnerabilities—missing endpoint controls, outdated or non-communicative controls, and misconfigurations. 
 

Get in touch
Get in touch
Customer Service
For any and all inquiries please click the button below
Speaking Opportunities

Tim Garon
Director, Event Content and Strategy

InfoSec World
Stay Informed
Join our mailing list for the latest news on InfoSec World 2024.