Prioritize with Purpose: Unleashing the Promise of Risk-Based Vulnerability Management | A Braunberg

Channel:
Subscribers:
4,540
Published on ● Video Link: https://www.youtube.com/watch?v=A06enCb63Ck



Duration: 41:51
4 views
0


Prioritize with Purpose: Unleashing the Promise of Risk-Based Vulnerability Management | A Conversation with Andrew Braunberg | Redefining CyberSecurity Podcast with Sean Martin

Guest: Andrew Braunberg, Principal Analyst at Omdia [@OmdiaHQ]

On Linkedin | https://www.linkedin.com/in/andrew-braunberg-74a69/

On Twitter | https://twitter.com/abraunberg

____________________________

Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]

On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin

____________________________

This Episode’s Sponsors

Imperva | https://itspm.ag/imperva277117988

Pentera | https://itspm.ag/penteri67a

___________________________

Episode Notes

In this episode of Redefining CyberSecurity Podcast, host Sean Martin engages in a thought-provoking conversation with Andrew Braunberg, a principal analyst at Omdia. They explore the world of risk-based vulnerability management and its potential to revolutionize security operations and risk management programs.

The discussion delves into the challenges of traditional vulnerability management, including the reliance on Common Vulnerability Scoring System (CVSS) scores and the increasing volume of software vulnerabilities. They stress the importance of context, value, and verifiable risk reduction in prioritizing actions to effectively mitigate risk.

Andrew shares insights on the convergence of risk management and vulnerability management, as well as the role of telemetry in gaining a comprehensive view of the digital landscape. The conversation also touches on the need to understand the external threat landscape and consolidate threat information for better predictions. They discuss the expansion of vulnerability management into dev environments and the broader view of vulnerability, encompassing exposure management and misconfigurations.

The potential for self-serve tools and services in risk-based vulnerability management is explored, along with the consolidation of security control validation and attack path validation capabilities. Throughout the episode, the importance of rethinking security programs and embracing a proactive security posture based on risk reduction is emphasized. Collaboration and communication between security teams, asset owners, and management are highlighted as crucial for effective vulnerability management and risk mitigation.

The conversation provides valuable insights into the world of risk-based vulnerability management and the shift towards proactive cybersecurity. So if you're seeking innovative approaches to vulnerability management and risk reduction, tune in to this enlightening episode of Redefining CyberSecurity Podcast with Sean Martin and Andrew Braunberg.

____________________________

Watch this and other videos on ITSPmagazine's YouTube Channel

Redefining CyberSecurity Podcast with Sean Martin, CISSP playlist:

📺 https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYqITSPmagazine YouTube Channel:

📺 https://www.youtube.com/@itspmagazine

Be sure to share and subscribe!

____________________________

Resources

Omdia research finds risk-based vulnerability management set to encompass the vulnerability management market by 2027 (press release): https://omdia.tech.informa.com/pr/2023/09-sep/omdia-research-finds-risk-based-vulnerability-management-set-to-encompass-the-vulnerability-management-market-by-2027

____________________________

To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:

https://www.itspmagazine.com/redefining-cybersecurity-podcast

Are you interested in sponsoring an ITSPmagazine Channel?

👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network




Other Videos By ITSPmagazine


2023-10-18Navigating the Privacy Maze: Mozilla’s Vehicle Privacy Report Sparks a Drive | A BlackCloak Story
2023-10-17The California Delete Act: Emerging Changes for Data Brokers and Its Impact on Data Privacy
2023-10-17Take Control of Your Destiny | A Conversation with Drew Simonis | The Soulful CXO Podcast
2023-10-15The philosophy of technology | A conversation with Philosopher Daniel Sanderson
2023-10-13"Old Fox's Justice" At The New York Theater Festival | With Tahiana Larissa & Marco Augusto Ferreira
2023-10-13The Future of Secure Business Browsing: Isolation and Protection | Browser Security / Isolation-101
2023-10-13The Dawn of Conscious Machines | A Conversation with Jeremie Harris | Cyber Cognition with Hutch
2023-10-13Shecurity | A Conversation with Deidre Diamond | The Leadership Student Podcast with MK Palmore
2023-10-12Covering Risk: Insurance to Cyber | A Conversation with Lupe Peterman | 2 Cyber Chicks Podcast
2023-10-11How AI is Revolutionizing — and complicating — Cybersecurity...
2023-10-11Prioritize with Purpose: Unleashing the Promise of Risk-Based Vulnerability Management | A Braunberg
2023-10-10RSAC Sound Byte | A Conversation with Mayuresh Ektare | Locked Down Podcast
2023-10-10What Do You Bring to the Table | A Conversation with Bob Turner | The Soulful CXO Podcast
2023-10-08The Potential Implications of Splunk's Intended Acquisition by Cisco | Allie Mellen
2023-10-07Understanding the Profound Links and Letting Knowledge Drive Our Environmental Choices
2023-10-05How to Fix a Lagging Hypersonics Program | Bart Barthelemy | Leading Edge Discovery Podcast
2023-10-04From Concealment to Accountability: The SEC's Call for Transparency to Safeguard Shareholders
2023-10-03How to Claim a Better Life | A Conversation with Tara LaFon Gooch | The Soulful CXO Podcast
2023-10-02The Camp David Pact: A Dual Focus on Defense and Tech in the Global Semiconductor Landscape
2023-10-02A conversation with Gemma Galdon Clavell, founder and CEO of Eticas – making ethics real
2023-09-29Go Your Own Way | A Conversation with Chris Cochran | The Leadership Student Podcast with MK Palmore



Tags:
cybersecurity
risk-based vulnerability management
RBVM
risk management
security operations
vulnerability management
CVSS scores
software vulnerabilities
context
value
risk reduction
telemetry
digital landscape
external threats
exposure management
misconfigurations
self-serve tools
security control validation
attack path validation
proactive security
collaboration
communication
asset owners