Vulnerabilities are defects that require a patch, upgrade or configuration change. Once a vulnerability is discovered, it is only a matter of time before an attacker can take advantage of the defect. Companies cannot afford to lose time when it comes to Vulnerability Management, as they may suffer immeasurable losses as a result of a compromise. Vulnerability management is an ongoing process that organizations can use to make their IT environment more secure, and become more regulatory compliant. This concept is a critical process that can be very useful and provide great return on investment when implemented carefully, monitored for effectiveness, and adjusted regularly.

Join Cyber Security Expert, Derek A. Smith, who will outline the key steps to effective vulnerability management and provide an in-depth look at the tools, challenges and best practices of each part of the VM lifecycle. The webinar will examine the following:

Photograph of Derek A. Smith

Derek A. Smith, Founder, National Cybersecurity Education Center

Derek A. Smith is an expert at cybersecurity, cyber forensics, healthcare IT, SCADA security, physical security, investigations, organizational leadership and training. He is currently an IT Supervisor at the Internal Revenue Service. He is also owner of The Intercessors Investigative and Training Group (www.theintercessorgroup.com). Formerly, Derek worked for several IT companies including Computer Sciences Corporation and Booz Allen Hamilton. Derek spent 18 years as a special agent for various government agencies and the military. He is also a cyber security professor at the University of Maryland, University College and Virginia University of Science and Technology and has taught for over 25 years. Derek is retired from the US Army and also served in the US Navy, and Air Force for a total of 24 years. He is completing his Doctorate Degree in Organizational Leadership and has completed an MBA, MS in IT Information Assurance, Masters in IT Project Management, and a BS in Education. Derek has written several books including Cybersense: The Leaders Guide to Protecting Critical Information, and its companion workbook, and he has contributed to several other books as an author and technical adviser.

Prefers reduced motion setting detected. Animations will now be reduced as a result.