Threat and Vulnerability Management

Published: Dec. 20, 2021, 3:14 a.m.

This week, Adam and Andy talk all about how to start and run a threat  and vulnerability program at your company. From asset management,  scanning, remediation, and validation, they go over what is involved and how to orchestrate the effort cross-function to avoid down time. A TVM program is a key pillar of your defense so if you do not have one or want to improve your current one, listen in!

\n

-------------------------------------------

\n

Youtube Video Link: https://youtu.be/qTvtvfY3CaQ

\n

-------------------------------------------

\n

Documentation:

\n

https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/network-devices?view=o365-worldwide

\n

https://www.tenable.com/products/nessus

\n

https://www.qualys.com/

\n

-------------------------------------------

\n

Contact Us:

\n

Website: http://bluesecuritypod.com

\n

Twitter: https://twitter.com/bluesecuritypod

\n

Instagram: https://www.instagram.com/bluesecuritypodcast/

\n

Facebook: https://www.facebook.com/bluesecpod

\n

Twitch: https://www.twitch.tv/bluesecuritypod

\n

-------------------------------------------

\n

Andy Jaw

\n

Twitter: https://twitter.com/ajawzero

\n

LinkedIn: https://www.linkedin.com/in/andyjaw/

\n

Email: andy@bluesecuritypod.com

\n

-------------------------------------------

\n

Adam Brewer

\n

Twitter: https://twitter.com/ajbrewer

\n

LinkedIn: https://www.linkedin.com/in/adamjbrewer/

\n

Email: adam@bluesecuritypod.com

\n\n--- \n\nSend in a voice message: https://podcasters.spotify.com/pod/show/blue-security-podcast/message